WO2001082035A2 - Procede et appareil de verification de parties et de listes de parties d'un ensemble - Google Patents
Procede et appareil de verification de parties et de listes de parties d'un ensemble Download PDFInfo
- Publication number
- WO2001082035A2 WO2001082035A2 PCT/US2001/012942 US0112942W WO0182035A2 WO 2001082035 A2 WO2001082035 A2 WO 2001082035A2 US 0112942 W US0112942 W US 0112942W WO 0182035 A2 WO0182035 A2 WO 0182035A2
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- cryptographic
- components
- keys
- cryptographic key
- assembly
- Prior art date
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06K—GRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K17/00—Methods or arrangements for effecting co-operative working between equipments covered by two or more of main groups G06K1/00 - G06K15/00, e.g. automatic card files incorporating conveying and reading operations
- G06K17/0022—Methods or arrangements for effecting co-operative working between equipments covered by two or more of main groups G06K1/00 - G06K15/00, e.g. automatic card files incorporating conveying and reading operations arrangements or provisions for transferring data to distant stations, e.g. from a sensing device
- G06K17/0029—Methods or arrangements for effecting co-operative working between equipments covered by two or more of main groups G06K1/00 - G06K15/00, e.g. automatic card files incorporating conveying and reading operations arrangements or provisions for transferring data to distant stations, e.g. from a sensing device the arrangement being specially adapted for wireless interrogation of grouped or bundled articles tagged with wireless record carriers
-
- B—PERFORMING OPERATIONS; TRANSPORTING
- B62—LAND VEHICLES FOR TRAVELLING OTHERWISE THAN ON RAILS
- B62D—MOTOR VEHICLES; TRAILERS
- B62D65/00—Designing, manufacturing, e.g. assembling, facilitating disassembly, or structurally modifying motor vehicles or trailers, not otherwise provided for
Definitions
- the present invention relates to methods and apparatus for verifying parts and parts lists in an assembly and more particularly to the identification of parts in the assembly via the use of cryptographic techniques.
- Modern day assemblies such as automobiles, airplanes, space vehicles and power plants contain numerous expensive and/or critical components. During the useful lifetime of the assembly it is normal for repairs and replacements of some components to be made. In many assemblies the quality of a replacement component may be essential to the proper operation or fit of the assembly or the resale value of the assembly. For example, reports of the replacement of Original Equipment Manufacturer (OEM) parts in automobiles with cheap and inferior substitute components from stolen or used vehicles have been published. Additionally, car owners who do their own repairs may substitute parts considered by the manufacturer to be unauthorized or unapproved parts for use in a vehicle due to concerns over the quality of the components and related concerns pertaining to operation, safety or vehicle appearance. In some circumstances, such substitutions may affect the warranty obligations of the manufacturer. Similar types of substitutions may be made in numerous types of assemblies including but not limited to computers, home appliances, industrial equipment and electronic equipment.
- a method and system for verifying that a plurality of component parts of an assembly comprise components approved for use in said assembly.
- an integrated circuit that is subject to cryptographic verification and herein referred to as a cryptographic authentication module (CAM) is embedded within or securely affixed to at least some of the component parts of the assembly.
- the CAM is capable of securely holding a private or secret cryptographic key and of proving possession of that key to a cooperative verification controller which may be communicably coupled to the respective CAMs via one or more hard-wired communication links or via wireless communication links.
- the CAM may be packaged and/or secured to the respective component parts in a tamper resistant manner so that the CAMs are disabled if dislodged from the part to which the respective CAM was affixed.
- the respective CAM may erase its private or secret key, as applicable, upon the detection that the device is being dislodged from the part to which it was mounted, upon the detection of stress, or in response to other predetermined conditions.
- each CAM retains a private key of a public/private key pair.
- the verification controller stores in a memory a manifest that contains the public keys corresponding to the respective private keys held by the approved components of the assembly.
- the CAMs from time to time transmit a message to the verification controller proving possession of their respective private key by signing a message with their respective key or alternatively, transmit such messages in response to requests issued by the verification controller.
- the verification controller attempts to verify the identity of the respective CAMs using the public keys maintained in the manifest. If, for each public key stored within the manifest, a message is received which is signed with the corresponding private key, such is indicative of the fact that all components within the assembly comprise approved components and an indication of such event may be provided.
- the manifest may be stored in the verification controller upon manufacture of the assembly and the controller and updated via the use of a manifest server.
- the verification controller may comprise a portable device and the manifest may be downloaded from the manifest server to the verification controller to permit a single verification controller to be used to verify components of a number of assemblies.
- the manifest server may be administered by a trusted party, such as the manufacturer of the assembly.
- the trusted party may maintain as a manifest, the valid public keys associated with each of the relevant component parts in the assembly and, in response to a request, generate a certificate that includes the public keys associated with the relevant components of the assembly.
- This certificate may be signed by the trusted party and time-stamped to permit the verification controller to verify that a received manifest is the appropriate manifest to be used.
- information pertaining to the respective part may be included within the manifest.
- Fig. 1 is pictorial exploded view of an assembly of automotive components having cryptographic authentication modules affixed to selected components and a verification controller operative in a manner consistent with the present invention
- Fig. 2 is a block diagram of a cryptographic authentication module (CAM) of the type depicted in Fig. 1
- Fig. 3 is a block diagram of the verification controller (VC) of Fig. 1;
- Fig. 4 is a block diagram of the manifest server of Fig. 1;
- Fig. 5 is a diagram illustrating a manifest data structure for use in the system depicted in Fig. 1;
- Fig. 6 is a block diagram illustrating a verification controller coupled to a plurality of CAMs and a manifest server via a local area network and a wide area network respectively;
- Fig. 7 is a flow diagram illustrating a method of operation of a component verification system in a manner consistent with the present invention.
- Fig. 8 is a flow diagram illustrating a method for updating a manifest in the event a component is replaced with an approved replacement component .
- a method and system for verifying that a plurality of component parts comprise approved parts for use within an assembly.
- the component parts of the assembly for which verification is desired each have a cryptographic authentication module (CAM) securely affixed to the respective component.
- the CAMs transmit signed messages that are received by a verification controller.
- the verification controller determines whether the identity of the respective components, as indicated by the signed message, corresponds to an expected identity indicated via an entry in a manifest stored within the verification controller.
- a cryptographic authentication module (CAM) 10 is securely affixed to selected components of the automotive assembly.
- the components to which the CAMs are affixed will vary in different applications. Typically, however, the CAMs are affixed to components of substantial value or components having functions critical to the operation or safe use of the assembly.
- the CAMs which are identified in Fig. 1 as CAMs 10a through lOh, and generally referred to herein as CAMs 10, comprise devices which, in one embodiment, are capable of privately and securely holding at least one key of a cryptographic key pair.
- the system is illustrated as using cryptographic key pairs that comprise public/private key pairs, although it should be appreciated that either asymmetric or symmetric keys may be employed.
- the illustrated CAMs 10 are capable of storing a private key of a public/private key pair and of transmitting a message signed by the CAM using the respective private key held by the respective CAM.
- the CAMs may be embodied in different forms and may include the functionality associated with such devices generally known as smart cards which are commercially available from a number of companies and IBUTTONS which are available from Dallas Semiconductor, 4401 South Beltwood Parkway, Dallas, Texas 75244. The CAMs are discussed in greater detail below.
- the CAMs are securely affixed to the respective components to assure that once a CAM is affixed to the component, it may not be disassociated from that component and attached to another component.
- the technique employed for mounting a particular CAM to a corapone ⁇ - may vary based upon the nature of the CAM and the component. In typical applications, however, the CAMs may be affixed to the respective components by embedding the CAM within the component, via epoxy or any other suitable glue or adhesive or use of a mechanical fastening technique.
- CAM 10a is affixed to the rear bumper 11a
- CAM 10b is affixed to a rear fender lib
- CAM 10c is affixed to a rear wheel lie
- CAM lOd is affixed to a rear door lid
- CAM lOe is affixed to a front door lie
- CAM lOf is affixed to a front fender llf
- CAM lOg is affixed to a front wheel llg
- CAM lOh is affixed to a front bumper llh.
- the CAMs 10 are capable of communicating with a verification controller 12 over respective communication links.
- the communication links between the CAMs 10 and the verification controller 12 may comprise hardwired links, a network, such as a local area network, or wireless communication links.
- the verification controller 12 may be constructed as a part of the assembly or alternatively, may be a mobile unit or separable from the assembly. Different embodiments of the verification controller 12 are discussed subsequently.
- the verification controller 12 maintains a manifest that, in a preferred embodiment, includes public keys associated with private keys held by CAMs 10 affixed to the respective components of the relevant assembly. In the situation in which the verification controller 12 is constructed as a part of the assembly, the manifest may be stored within the verification controller 12 at the time
- the manifest may be transmitted or delivered to the verification controller 12 from a manifest server 14 over a network or a suitable communication link at the time of assembly, or thereafter, provided that a manifest server public key is accessible to the verification controller 12 to allow for authentication of the manifest.
- the manufacturer of the assembly affixes the respective CAMs to the components
- the manufacturer of the assembly may generate the public/private key pairs and store the public keys in the manifest.
- such other party or parties may maintain one or more source servers 15, which communicate to the manifest server 14 an identification of a particular component along with the public key associated with the CAM securely affixed to that component.
- a cryptographic authentication module (CAM) 10 that is securely affixed to a component is depicted in Fig. 2.
- the CAM 10 includes a processor 16 that is coupled to a memory 20 and an arithmetic accelerator 18. While the processor 16 and arithmetic accelerator 18 are depicted as separate blocks in Fig. 2 it should be appreciated that the processor 16 may include the functions of the arithmetic accelerator 18 as an integral part of the processor 16. At least a portion of the memory 20 is non-volatile and stores the private key of the public/private key pair for the respective CAM 10.
- the processor 16 is also coupled to a communication interface 22 that is appropriate for the particular type of communication link being employed between the CAM 10 and the verification controller 12.
- the communication interface 22 includes the data link and MAC interface logic for an Ethernet link.
- the communication interface 22 in addition to the necessary protocol support, includes an RF receiver and transmitter. It should be noted that any suitable communication link may be employed, including but not limited to a hard-wired link, an RF link or an infrared link.
- the CAMs 10 may have different levels of security but are typically designed so as to erase the private key held in the memory of the respective CAM in the event that tampering with the CAM is detected. For example, the private key stored within the CAM may be erased from the
- each CAM 10 securely stores the private key of its respective public/private key pair and the public key is stored in the manifest as is subsequently described in greater detail.
- the private key may be provided to the CAM
- the CAMs 10 as input from a secure private key source and the corresponding public key stored within the manifest.
- the CAMs 10 generates a public/private key pair, securely store the respective private key within the CAM 10 in a manner that precludes access to the private key, and provides access to the respective public key of the public/private key pair.
- FIG. 3 A block diagram of an illustrative verification controller 12 operative in a manner consistent with the present invention is depicted in Fig. 3.
- the verification controller 12 may comprise a computer, a personal digital assistant (PDA) , an intelligent network appliance, a controller, or any other device capable of receiving messages from the CAMs 10, and in some embodiment transmitting messages to the CAMs as herein described.
- the verification controller 12 includes a processor 12a and a communication interface 12d for receiving messages from the CAMs and optionally transmitting messages to the CAMS.
- the processor 12a is operative to execute a software program out of instruction/data memory 12b and the verification controller, optionally, may include secondary storage 12c.
- the memory 12b which may comprise RAM, ROM or a combination of both, stores an operating system 12e and application code 12f which is operative to perform the presently described verification functions.
- the application code 12f includes messaging software for receiving the messages from the CAMs 10 and optionally transmitting requests to the CAMs 10.
- the manifest server 14 may comprise a computer, a personal digital assistant (PDA) , an intelligent network appliance, a controller, or any other device capable of generating manifests of the type herein described and communicating such manifests to a verification controller 12.
- the manifest server 14 includes a processor 14a and a communication interface 14d.
- the communication interface 14d in a preferred embodiment, is coupled to a network to allow the manifest server 14 to forward manifests to verification controllers 12, to receive certificates from source servers 15 (See Fig.
- the processor 14a is operative to execute a software program out of instruction/data memory 14b.
- the manifest server 14 may optionally include secondary storage 14c.
- the memory 14b which may comprise RAM, ROM or a combination of both, stores an operating system 14e and application code 14f that is operative to perform the functions attributed to the manifest server 14.
- the application code 14f includes messaging software for receiving the messages from source servers 15 and authorized repair agents (not shown) and for generating and forwarding manifests as well as updated manifests .
- a manufacturer is assembling an automobile.
- Selected components have CAMs 10 securely affixed to the respective components and a public/private key pair is generated either by or for the respective CAMs 10.
- Each CAM 10 stores a private key that is employed by the respective CAM to sign messages that are forwarded by that CAM.
- the private key may be generated within the CAM as one key of a public/private key pair generated by the respective CAM or alternatively, the public/private key pair may be generated external to the CAM and the private key may be stored within the CAM.
- the public keys are collected and stored within a manifest as illustrated in Fig. 5. More particularly, referring to Fig.
- the manifest includes a public key associated with a private key held in a CAM for each component illustrated in Fig. 1.
- the manifest is preferably cryptographically authenticated such as via a digital signature.
- the minimal manifest includes the public keys associated with the respective CAMs.
- the manifest may contain additional information such as the Vehicle Identification Number (VIN) number of the vehicle, the name of the manufacturer of the component (Issuer) , an identification of the part (Part No.), a serial number for the part, a manufacturing lot number for the part, the manufacturing location, the manufacturing date and any other information relevant to the part that may be useful during the useful life of the component.
- VIN Vehicle Identification Number
- Issuer an identification of the part
- Part No. an identification of the part
- serial number for the part a manufacturing lot number for the part
- the manufacturing location the manufacturing date and any other information relevant to the part that may be useful during the useful life of the component.
- the information may be provided to the manufacturer of the automobile by the subcontractor in the form of a certificate issued by the respective subcontractor.
- the information provided to the automobile manufacturer from the subcontractor is in the form of a certificate signed by the subcontractor.
- the certificates from the subcontractors, or possibly from the manufacturers' remote manufacturing sites are communicated from source servers 15a - 15n to the manifest server 14 via a network 22 as depicted in Fig. 6.
- the network 22 may comprise a local area network, a wide area network, a wireless network, the Internet or any other network for communicably coupling the source servers 15 to the manifest server 14 and for communicably coupling the manifest server 14 to the verification controller (s) 12.
- the manifest server 14 assembles the manifest and transmits the completed manifest to the verification controller 12.
- the communication link between the manifest 14 and the verification controller 12 is illustrated as a network 22, however, the communication link between the manifest server 14 and the verification controller may comprise a hard wired link such as a serial or parallel link, an infra red link, or any other communications link suitable for forwarding the manifest to the verification controller 12.
- the verification controller 12 In order for the verification controller 12 to verify the authenticity of manifests forwarded to it by the manifest server 14, the verification controller 12 is provided with the public key of the manifest server 1 .
- the public key of the manifest server 14 may be loaded into the verification controller 12 upon manufacture or initialization of the verification controller 12 or otherwise made available to the verification controller 12 via a secure communications link.
- the verification controller 12 may determine whether all of the components that correspond to components associated with the public keys within the manifest are present within the vehicle. This determination may be made in response to a request initiated by a verification controller 12 user or alternatively, may be performed from time to time or periodically.
- the verification controller 12 engages in a challenge response dialog with each of the CAMs. More specifically, the verification controller may transmit random information or a time stamped message to each of the CAMs 10. In response to receipt of the message from the verification controller 12, each CAM transmits a response message to the verification controller 12 that is cryptographically authenticated by the respective CAM.
- the cryptographic authentication may comprise a digital signature that is generated using the private key of the respective CAM. In the example in which the authentication is via a digital signature that is generated using the CAM private key, for each received message, the verification controller 12 attempts to verify that the message received from the respective CAM was signed with a private key having a corresponding public key contained within the manifest.
- the verification controller 12 attempts verify the signature of the respective CAM using each of the public keys within the manifest until the proper public key is identified, or alternatively, it is determined that the signed message received from a CAM 10 by the verification controller 12 cannot be verified using any of the public keys within the manifest. If the verification controller verifies all of the signed messages, an indication of such event may be provided to a user. In the event one of the received messages includes a digital signature that cannot be verified using the public keys contained within the manifest or, in the event a digital signature is not received that corresponds to one of the public keys within the manifest, an indication of this circumstance may be provided and an identification of the part may be output via a display such as warning indicator 24 (See Fig. 6). Alternatively, such information may be output audibly or via a link to an external readout device that is linked to the verification controller 12.
- the verification controller 12 may, upon verification of one of the digitally signed messages, check the time stamp to assure that it corresponds to the time stamp within the challenge response dialog that resulted in the forwarding of the respective message and additionally, to assure that the time stamp corresponds to the transmitted time stamp within a specified time interval . Such a check will avoid the possibility that the verification controller would indicate the presence of a component as a result of the malicious replay of a message previously transmitted by a CAM.
- a pseudo random number or any other secret value may be included within the request issued by the verification controller 12.
- the processing time associated with the trial and error approach of attempting to verify a received message with each public key in the manifest until the message is successfully verified or the attempt to verify the message with all public keys has proved unsuccessful may be shortened by including a part number both in the manifest and in the return message from the CAM.
- the verification controller 12 may then attempt to verify each message with only the public key or keys in the manifest associated with the same part number that was conveyed to the verification controller 12 in the signed message from the respective CAM 10. For example, there may be five public keys in the manifest associated with wheels (four wheels mounted on the automobile and one spare) . All of these components may have the same part number but will be associated with different public/private key pairs.
- the CAMs 10 transmit messages to the verification controller 12 in response to requests received from the verification controller 12.
- the CAMs 10 can transmit messages to the verification controller 12 periodically or in response to predetermined events.
- a CAM 10 may periodically transmit the date and time of day digitally signed by the respective CAM. Assuming that the CAMs and the verification controller 12 have relatively closely synchronized clocks, the verification controller 12 will receive the signed message containing the date and time of day close to the time the message was generated. The verification controller 12 can then verify the signature using one of the public keys in the manifest. In this manner, the CAMs need not respond to a request issued by the verification controller 12 to initiate their respective transmissions.
- a manifest containing a least the public keys associated with a plurality of components within an assembly is stored on the verification controller 12 as illustrated in step 100.
- the verification controller 12 sends a request to the CAMs to prove their respective identities. Since the CAMs are securely affixed to specific components of the assembly, if one or more of the components either has a non-functioning CAM, no CAM, or a CAM that possesses the wrong private key, the CAM (if any) associated with the respective component will be unable to respond to the request issued by the verification controller in a manner that will verify the component expected to be present in the assembly.
- the verification controller 12 receives the signed responses from the CAMs 10 as illustrated in step 104.
- the verification controller 12 attempts to verify the identify of the respective CAMs affixed to the components via use of the public keys within the manifest stored in the verification controller 12.
- inquiry step 108 inquiry is made whether any messages were received from a CAM 10 that could not be verified using a public key within the manifest.
- an indication of the same is provided via a readout, warning indication, control signal or other suitable output indicative of the verification failure as shown in step 112.
- control passes to inquiry step 110.
- public keys that correspond to a private key that was not used in the signing of one of the received CAM messages such is indicative that the CAM associated with the component is not responding for any one of a number of reasons.
- the CAM may have been tampered with and ceased to function.
- the component may have been replaced with another component that includes a CAM, but the component was not registered with the manifest server, as subsequently described, and accordingly, is not reflected in the manifest.
- the component may have been replaced with an unapproved component that does not possess the CAM functionality.
- the manifest is initially stored on the verification controller and additionally, at the request of a user.
- the manifest may be updated from time to time to account for authorized replacements of components of the assembly. More specifically, referring to the flow diagram of Fig. 8, when a component within the assembly needs to be replaced, such replacement is performed by an authorized agent using approved components.
- the replacement component having a new CAM securely affixed thereto is substituted within the assembly for the old component as depicted in step 200.
- the repair center that replaced the component transmits a certificate to the manifest server that identifies the component that was replaced, the vehicle VIN Number (or assembly identification, as applicable) along with the public key associated with the CAM affixed to the substituted component. Additionally, other information pertaining to the substituted component may be included within the certificate as outlined above with respect to Fig. 5.
- the certificate forwarded to the manifest server 14 from the repair center is preferably signed by the repair center.
- the manifest server 14 verifies the signature of the repair center using the repair center public key.
- the manifest server 14 updates the manifest to reflect the public key associated with the replacement part.
- the manifest may maintain information on the old components that were removed from the assembly for historical purposes; however, the public key associated with the substituted component is used for verification purposes in place of the public key associated with the component that was removed from the assembly.
- the updated manifest is communicated to the verification controller 12 and is signed by a trusted party, such as the vehicle manufacturer.
- the updated manifest is signed using the private key of a public/private key pair held by the manifest server.
- the verification controller 12 verifies the authenticity of the updated manifest using the public key of the manifest server 14 public/private key pair.
- the verification controller 12 then utilizes the updated manifest for verification of the components of the assembly as described in connection with Fig. 7 hereinabove .
- the verification controller 12 may comprise a unit integral with the assembly, such as the automobile, or may be a mobile unit that may be communicably coupled to the CAMs via a connector or via a RF or other communications link.
- the use of a portable verification controller 12 allows law enforcement, or other oversight officials to download manifests for specific vehicles or assemblies and request component verification for the particular vehicle or assembly should there be a concern regarding the components employed within any given vehicle or other assembly.
- cryptographic authentication of the identify of the CAMs and associated components, verification controller 12, manifest server and other components discussed herein is described in the preferred embodiment using signed messages for cryptographic authentication, cryptographic authentication may be performed using any suitable cryptographic authentication technique including but not limited to a keyed hash, a cryptographic hash incorporated in an encrypted message or any other suitable authentication technique.
- the presently described methods may be implemented in software executing out of a memory on respective CAMs, the verification controller, the manifest server and the source servers.
- the presently described functions may be embodied in whole or in part using hardware components such as Application Specific Integrated Circuits (ASICs) , state machines, controllers or other hardware components or devices, or a combination of hardware components and software processes without departing from the inventive concepts herein described.
- ASICs Application Specific Integrated Circuits
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- General Engineering & Computer Science (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Theoretical Computer Science (AREA)
- Manufacturing & Machinery (AREA)
- Chemical & Material Sciences (AREA)
- Combustion & Propulsion (AREA)
- Transportation (AREA)
- Mechanical Engineering (AREA)
- Lock And Its Accessories (AREA)
Abstract
La présente invention concerne un procédé et un appareil permettant de vérifier la présence de composants agréés dans un ensemble. Une paire de clés cryptographiques comprenant une première et une seconde clé cryptographique est générée pour chacun des composants de cet ensemble parmi une pluralité d'entre eux sélectionnés et une paire est associée à un module d'authentification cryptographique (CAM) fixé sur chacun de ces composant sélectionnés. Ces CAM stockent la première clé cryptographique respective. Les secondes clés cryptographiques correspondant à chacune des premières clés cryptographiques des paires de clés cryptographiques sont stockées dans un manifeste à l'intérieur d'un contrôleur de vérification. Sur demande, ou de temps à temps, chacun des CAM transmet un message au contrôleur de vérification qui est authentifié de façon cryptographique avec la première clé cryptographique du module respectif. Le contrôleur de vérification utilise les secondes clés cryptographiques pour tenter de vérifier l'identité des CAM. Si le contrôleur de vérification est à même de vérifier un message utilisant chacune des secondes clés cryptographiques stockées dans le manifeste, ceci indique la présence des composants sélectionnés de cet ensemble. Si le contrôleur de vérification n'est pas à même de vérifier un message en utilisant une des secondes clés cryptographiques stockées dans le manifeste, ceci indique soit que l'un des composants agréés a été remplacé par un composant qui ne possède pas de CAM, soit qu'il a été remplacé par un CAM qui possède une paire de clés cryptographiques, alors que la seconde clé cryptographique de cette paire de clés n'a pas été enregistrée dans le manifeste.
Priority Applications (1)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| AU2001255553A AU2001255553A1 (en) | 2000-04-26 | 2001-04-20 | Method and apparatus verifying parts and parts lists in an assembly |
Applications Claiming Priority (2)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| US55849100A | 2000-04-26 | 2000-04-26 | |
| US09/558,491 | 2000-04-26 |
Publications (2)
| Publication Number | Publication Date |
|---|---|
| WO2001082035A2 true WO2001082035A2 (fr) | 2001-11-01 |
| WO2001082035A3 WO2001082035A3 (fr) | 2003-02-13 |
Family
ID=24229744
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| PCT/US2001/012942 WO2001082035A2 (fr) | 2000-04-26 | 2001-04-20 | Procede et appareil de verification de parties et de listes de parties d'un ensemble |
Country Status (2)
| Country | Link |
|---|---|
| AU (1) | AU2001255553A1 (fr) |
| WO (1) | WO2001082035A2 (fr) |
Cited By (15)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| WO2004003812A3 (fr) * | 2002-06-28 | 2004-04-08 | Motorola Inc | Procede et systeme autorisant la reconfiguration d'un vehicule |
| US7127611B2 (en) | 2002-06-28 | 2006-10-24 | Motorola, Inc. | Method and system for vehicle authentication of a component class |
| US7137001B2 (en) | 2002-06-28 | 2006-11-14 | Motorola, Inc. | Authentication of vehicle components |
| US7181615B2 (en) | 2002-06-28 | 2007-02-20 | Motorola, Inc. | Method and system for vehicle authentication of a remote access device |
| DE10232454B4 (de) * | 2002-01-31 | 2007-08-02 | Fujitsu Ltd., Kawasaki | Zugriffssteuerungsverfahren, Speichervorrichtung und Informationsverarbeitungsvorrichtung |
| EP1903518A1 (fr) | 2006-09-15 | 2008-03-26 | NCR Corporation | Validation de sécurité de composants de machine |
| US7549046B2 (en) * | 2002-06-28 | 2009-06-16 | Temic Automotive Of North America, Inc. | Method and system for vehicle authorization of a service technician |
| DE102007044586B3 (de) * | 2007-09-19 | 2009-07-09 | Knorr-Bremse Systeme für Nutzfahrzeuge GmbH | Steuergerät und Verfahren zur Identifikation von Ersatzteilen eines Fahrzeugs |
| DE102008032094A1 (de) * | 2008-07-08 | 2010-01-14 | Continental Automotive Gmbh | Fahrzeug mit einer Vorrichtung zur Erfassung von Fahrzeugkomponenten und Verfahren zur Komponentenerfassung durch ein Fahrzeug |
| CN103268676A (zh) * | 2013-04-02 | 2013-08-28 | 广州御银科技股份有限公司 | 一种验证金融自助服务终端真伪的系统及方法 |
| DE102009037193B4 (de) * | 2008-08-15 | 2016-10-13 | GM Global Technology Operations LLC (n. d. Ges. d. Staates Delaware) | System und Verfahren zum Durchführen eines Austauschs eines asymmetrischen Schlüssels zwischen einem Fahrzeug und einer entfernten Einrichtung |
| DE102015218800A1 (de) | 2015-09-29 | 2017-03-30 | Continental Automotive Gmbh | Kommunikationssystem zur V2X-Kommunikation |
| CN112311718A (zh) * | 2019-07-24 | 2021-02-02 | 华为技术有限公司 | 检测硬件的方法、装置、设备及存储介质 |
| CN113477679A (zh) * | 2021-07-19 | 2021-10-08 | 青岛科技大学 | 一种大批量废旧手机拆解工艺的交互式生成方法 |
| DE102012215729B4 (de) | 2011-09-19 | 2025-07-10 | GM Global Technology Operations, LLC (n.d. Ges. d. Staates Delaware) | Verfahren zum Authentisieren von Datendateien |
Family Cites Families (4)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US5224163A (en) * | 1990-09-28 | 1993-06-29 | Digital Equipment Corporation | Method for delegating authorization from one entity to another through the use of session encryption keys |
| US5757916A (en) * | 1995-10-06 | 1998-05-26 | International Series Research, Inc. | Method and apparatus for authenticating the location of remote users of networked computing systems |
| US5974150A (en) * | 1997-09-30 | 1999-10-26 | Tracer Detection Technology Corp. | System and method for authentication of goods |
| US6222440B1 (en) * | 1998-02-23 | 2001-04-24 | Freshloc Technologies, Inc. | Location, identification and telemetry system using strobed signals at predetermined intervals |
-
2001
- 2001-04-20 WO PCT/US2001/012942 patent/WO2001082035A2/fr active Application Filing
- 2001-04-20 AU AU2001255553A patent/AU2001255553A1/en not_active Abandoned
Cited By (22)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| DE10232454B4 (de) * | 2002-01-31 | 2007-08-02 | Fujitsu Ltd., Kawasaki | Zugriffssteuerungsverfahren, Speichervorrichtung und Informationsverarbeitungsvorrichtung |
| WO2004003812A3 (fr) * | 2002-06-28 | 2004-04-08 | Motorola Inc | Procede et systeme autorisant la reconfiguration d'un vehicule |
| US7127611B2 (en) | 2002-06-28 | 2006-10-24 | Motorola, Inc. | Method and system for vehicle authentication of a component class |
| US7137001B2 (en) | 2002-06-28 | 2006-11-14 | Motorola, Inc. | Authentication of vehicle components |
| US7181615B2 (en) | 2002-06-28 | 2007-02-20 | Motorola, Inc. | Method and system for vehicle authentication of a remote access device |
| US7325135B2 (en) | 2002-06-28 | 2008-01-29 | Temic Automotive Of North America, Inc. | Method and system for authorizing reconfiguration of a vehicle |
| US7549046B2 (en) * | 2002-06-28 | 2009-06-16 | Temic Automotive Of North America, Inc. | Method and system for vehicle authorization of a service technician |
| EP1903518A1 (fr) | 2006-09-15 | 2008-03-26 | NCR Corporation | Validation de sécurité de composants de machine |
| US7575160B2 (en) | 2006-09-15 | 2009-08-18 | Ncr Corporation | Security validation of machine components |
| DE102007044586B3 (de) * | 2007-09-19 | 2009-07-09 | Knorr-Bremse Systeme für Nutzfahrzeuge GmbH | Steuergerät und Verfahren zur Identifikation von Ersatzteilen eines Fahrzeugs |
| DE102008032094A1 (de) * | 2008-07-08 | 2010-01-14 | Continental Automotive Gmbh | Fahrzeug mit einer Vorrichtung zur Erfassung von Fahrzeugkomponenten und Verfahren zur Komponentenerfassung durch ein Fahrzeug |
| DE102009037193B4 (de) * | 2008-08-15 | 2016-10-13 | GM Global Technology Operations LLC (n. d. Ges. d. Staates Delaware) | System und Verfahren zum Durchführen eines Austauschs eines asymmetrischen Schlüssels zwischen einem Fahrzeug und einer entfernten Einrichtung |
| US9800413B2 (en) | 2008-08-15 | 2017-10-24 | Gm Global Technology Operations, Inc. | System and method for performing an asymmetric key exchange between a vehicle and a remote device |
| DE102012215729B4 (de) | 2011-09-19 | 2025-07-10 | GM Global Technology Operations, LLC (n.d. Ges. d. Staates Delaware) | Verfahren zum Authentisieren von Datendateien |
| CN103268676A (zh) * | 2013-04-02 | 2013-08-28 | 广州御银科技股份有限公司 | 一种验证金融自助服务终端真伪的系统及方法 |
| DE102015218800A1 (de) | 2015-09-29 | 2017-03-30 | Continental Automotive Gmbh | Kommunikationssystem zur V2X-Kommunikation |
| US10623921B2 (en) | 2015-09-29 | 2020-04-14 | Continental Teves Ag & Co. Ohg | Communications system for V2X communication |
| CN112311718A (zh) * | 2019-07-24 | 2021-02-02 | 华为技术有限公司 | 检测硬件的方法、装置、设备及存储介质 |
| CN112311718B (zh) * | 2019-07-24 | 2023-08-22 | 华为技术有限公司 | 检测硬件的方法、装置、设备及存储介质 |
| US12047388B2 (en) | 2019-07-24 | 2024-07-23 | Huawei Technologies Co., Ltd. | Hardware detection method and apparatus, device, and storage medium |
| CN113477679A (zh) * | 2021-07-19 | 2021-10-08 | 青岛科技大学 | 一种大批量废旧手机拆解工艺的交互式生成方法 |
| CN113477679B (zh) * | 2021-07-19 | 2022-10-14 | 青岛科技大学 | 一种大批量废旧手机拆解方法 |
Also Published As
| Publication number | Publication date |
|---|---|
| AU2001255553A1 (en) | 2001-11-07 |
| WO2001082035A3 (fr) | 2003-02-13 |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| JP6078686B2 (ja) | 認証システム、車載制御装置 | |
| CN101416223B (zh) | 保护动产特别是车辆以防止未经许可的使用的方法 | |
| JP4890248B2 (ja) | 所定の区域へのアクセスの制御 | |
| US7551986B2 (en) | Program distribution system, program distribution device, and in-vehicle gateway device | |
| US8015597B2 (en) | Disseminating additional data used for controlling access | |
| US7716486B2 (en) | Controlling group access to doors | |
| US8261319B2 (en) | Logging access attempts to an area | |
| US9571284B2 (en) | Controlling access to personal information stored in a vehicle using a cryptographic key | |
| WO2001082035A2 (fr) | Procede et appareil de verification de parties et de listes de parties d'un ensemble | |
| US20080027602A1 (en) | System and method for deterring theft of vehicles and other products having integral computer means | |
| JP2009544073A (ja) | コンピュータシステムの部品認証 | |
| WO1998004967A1 (fr) | Systeme de protection d'immobilisation pour produits et elements electroniques | |
| US9893886B2 (en) | Communication device | |
| WO2004004207A1 (fr) | Procede et systeme d'authentification de composant de vehicule par un composant d'un autre vehicule | |
| Kent et al. | Assuring vehicle update integrity using asymmetric public key infrastructure (PKI) and public key cryptography (PKC) | |
| JP2010182070A (ja) | 情報処理装置及び情報処理方法及びプログラム | |
| CN112887099B (zh) | 数据签名方法、电子设备及计算机可读存储介质 | |
| CN114124578A (zh) | 一种通信方法、装置、车辆及存储介质 | |
| Bar-El | Intra-vehicle information security framework | |
| Weimerskirch et al. | Cryptographic component identification: Enabler for secure vehicles | |
| US20230237507A1 (en) | System and method for generating a digital vehicle identification number | |
| Wolf | Vehicular security mechanisms | |
| JP2004276828A (ja) | 車両特定システム及び車両特定方法 | |
| Kim et al. | Analysis of OBE-related SCMS security requirements and evaluation procedures in V2X environment | |
| Höper | Cryptographic protocols for component identification and applications |
Legal Events
| Date | Code | Title | Description |
|---|---|---|---|
| AK | Designated states |
Kind code of ref document: A2 Designated state(s): AE AG AL AM AT AU AZ BA BB BG BR BY BZ CA CH CN CO CR CU CZ DE DK DM DZ EE ES FI GB GD GE GH GM HR HU ID IL IN IS JP KE KG KP KR KZ LC LK LR LS LT LU LV MA MD MG MK MN MW MX MZ NO NZ PL PT RO RU SD SE SG SI SK SL TJ TM TR TT TZ UA UG UZ VN YU ZA ZW |
|
| AL | Designated countries for regional patents |
Kind code of ref document: A2 Designated state(s): GH GM KE LS MW MZ SD SL SZ TZ UG ZW AM AZ BY KG KZ MD RU TJ TM AT BE CH CY DE DK ES FI FR GB GR IE IT LU MC NL PT SE TR BF BJ CF CG CI CM GA GN GW ML MR NE SN TD TG |
|
| 121 | Ep: the epo has been informed by wipo that ep was designated in this application | ||
| DFPE | Request for preliminary examination filed prior to expiration of 19th month from priority date (pct application filed before 20040101) | ||
| 122 | Ep: pct application non-entry in european phase | ||
| NENP | Non-entry into the national phase |
Ref country code: JP |