메시지 인증 코드 혼합을 통한 CAN 패킷 인증 방법 및 그 장치
    5.
    发明授权
    메시지 인증 코드 혼합을 통한 CAN 패킷 인증 방법 및 그 장치 有权
    使用MAC DIVISON和APPRATUS来实现CAN分组的方法

    公开(公告)号:KR101572935B1

    公开(公告)日:2015-12-11

    申请号:KR1020140133321

    申请日:2014-10-02

    Abstract: 본발명은 CAN 네트워크에서패킷을인증하는방법에관한것으로, 보다상세히는분할및 혼합된메시지인증코드를이용한효율적인인증방법및 이를위한장치에관한것이다. 본발명의일 실시예에따른 CAN 네트워크에서메시지를혼합메시지인증코드(MAC)를이용하여전송하는방법은제 1 메시지를이용하여제 1 MAC을생성하는단계; 상기제 1 MAC을제 1 부분 MAC 및제 2 부분 MAC으로분할하는단계; 제 2 메시지를이용하여제 2 MAC을생성하는단계; 상기제 2 MAC을제 3 부분 MAC 및제 4 부분 MAC으로분할하는단계; 상기제 2 부분 MAC 및상기제 3 부분 MAC을선형연산하여제 1 인증 MAC을생성하는단계; 상기제 1 메시지를상기제 1 부분 MAC과함께전송하는단계; 및상기제 2 메시지를상기제 1 인증 MAC과함께전송하는단계를포함할수 있다.

    Abstract translation: 本发明涉及一种用于认证控制器区域网(CAN)中的分组的方法,更具体地说,涉及一种使用分割和混合消息认证码的有效认证方法及其装置。 根据本发明的实施例,用于通过使用混合消息认证码(MAC)在CAN中发送消息的方法包括以下步骤:通过使用第一消息来生成第一MAC; 将第一MAC划分为第一部分MAC和第二部分MAC; 通过使用第二消息来生成第二MAC; 将第二MAC划分为第三部分MAC和第四部分MAC; 通过使用第二部分MAC和第三部分MAC的线性操作来生成第一认证MAC; 用第一部分MAC发送第一消息; 以及用所述第一认证MAC发送所述第二消息。

    CAN 패킷 자동 분석 방법
    6.
    发明授权
    CAN 패킷 자동 분석 방법 有权
    CAN通信中的自动分组分析方法

    公开(公告)号:KR101371895B1

    公开(公告)日:2014-03-10

    申请号:KR1020120144901

    申请日:2012-12-12

    CPC classification number: H04L43/045 H04L43/16 H04L2012/40215

    Abstract: A controller area network (CAN) packet automatic analysis method according to the present invention, which comprises the steps of sorting packets related to the performance of a specific function among data packets used in CAN, and comparing and analyzing the change of packet data values with time on the graph, enables a simple and efficient analysis on the function, the type and the operation method of the packet. [Reference numerals] (AA) Start; (BB) End; (ST10) Input data and perform a function?; (ST11) Read a log file and write ID array; (ST12) Calculate a data variation value (A) before performing the function; (ST13) Calculate a difference (B) of average data amount by section before and during performing the function; (ST14) Record and store the variation according to the time relative to a packet satisfying with 'B/A > Threshold value'; (ST15) Performing analysis?; (ST16) Display an analysis result; (ST17) Section '1' increase; (ST18) Section end?

    Abstract translation: 一种根据本发明的控制器局域网(CAN)数据包自动分析方法,包括以下步骤:对与CAN中使用的数据包中的特定功能的性能相关的分组进行排序,并将分组数据值的变化与 时间在图上,能够对数据包的功能,类型和操作方法进行简单有效的分析。 (附图标记)(AA)开始; (BB)结束; (ST10)输入数据并执行功能? (ST11)读取日志文件并写入ID数组; (ST12)在执行功能之前计算数据变化值(A) (ST13)在执行功能之前和期间计算平均数据量的差(B); (ST14)根据相对于满足“B / A>阈值”的包的时间记录和存储变化; (ST15)进行分析? (ST16)显示分析结果; (ST17)第1节增加; (ST18)截面?

    나노 입자를 포함하는 자유기립형 필름의 제조방법
    8.
    发明授权
    나노 입자를 포함하는 자유기립형 필름의 제조방법 有权
    制备包含纳米颗粒的自由涂膜的方法

    公开(公告)号:KR101626891B1

    公开(公告)日:2016-06-02

    申请号:KR1020140195380

    申请日:2014-12-31

    CPC classification number: B82B3/00 C08J5/18

    Abstract: 본발명은대면적으로제작이가능한나노입자를포함하는자유기립형필름의제조방법을위하여, 나노입자가분산된콜로이드용액을준비하는단계, 상기콜로이드용액을알파-시누클레인단백질과혼합하여배양시켜상기나노입자와상기알파-시누클레인단백질이결합된결합체(conjugate)를형성시키는단계, 상기결합체를포함한콜로이드용액을고분자기판상에도포한후 소정시간유지시켜상기결합체를상기고분자기판상에흡착시켜결합체로이루어진필름을형성하는단계및 상기고분자기판을식각용액으로선택적으로제거하는단계를포함하는, 나노입자를포함하는자유기립형필름의제조방법을제공한다.

    Abstract translation: 本发明涉及一种包含纳米颗粒并可制造成具有大面积的自立膜的方法。 制造包含纳米颗粒的自立膜的方法包括以下步骤:制备其中分散有纳米颗粒的胶体溶液; 与α-突触核蛋白结合培养胶体溶液以形成包含与α-突触核蛋白结合的纳米颗粒的缀合物; 将含有缀合物的胶体溶液施加到聚合物基底上,使基底静置预定时间以使缀合物吸附到聚合物基底上,从而形成包含该缀合物的膜; 并用蚀刻溶液选择性地除去聚合物基材。

    차량용 네트워크의 침입 탐지 시스템(IDS) 및 그 제어방법
    9.
    发明授权
    차량용 네트워크의 침입 탐지 시스템(IDS) 및 그 제어방법 有权
    车内网络侵入检测系统及其控制方法

    公开(公告)号:KR101638613B1

    公开(公告)日:2016-07-11

    申请号:KR1020150054404

    申请日:2015-04-17

    Abstract: 본발명은차량내부네트워크에대한공격시도를사전에차단하는침입탐지시스템(IDS) 및그 제어방법에관한것이다. 상기와같은과제를해결하기위해본 발명의일 실시예에따른차량의공격탐지시스템(IDS)에서네트워크공격을탐지하는방법은, 기설정된주기동안네트워크의메시지들을입력받는단계; 상기입력된각 메시지별로현재발생빈도값을구하는단계; 상기주기가시작될때 차량의동작상태정보를입력받는단계; 상기동작상태정보에대응되는메시지별정상발생빈도값을호출하는단계; 상기현재발생빈도값 및상기정상발생빈도값을이용하여메시지별로선형근사화한상대거리함수연산을수행하는단계; 및상기선형근사화한상대거리함수연산의결과를기 설정된임계값과비교하여상기각 메시지별로공격상태여부를판단하는단계를포함할수 있다.

    Abstract translation: 入侵检测系统(IDS)及其控制方法技术领域本发明涉及一种先前阻止企图攻击车载网络的入侵检测系统(IDS)及其控制方法。 为此,根据本发明的实施例的用于检测在车辆的攻击检测系统(或IDS)中的网络的攻击的方法可以包括以下步骤:在预设时段内接收网络的消息; 获得每个接收到的消息的当前重复率; 在该周期的起始点接收车辆的操作状态信息; 为每个消息调用对应于操作状态信息的正常重复率; 通过使用当前重复率和正常重复率来计算每个消息的线性近似相对距离函数; 以及通过将所述线性近似相对距离函数的计算结果与预设阈值进行比较来确定是否存在针对每个消息的攻击状态。

    차량 네트워크 공격 탐지 장치 및 그 방법
    10.
    发明授权
    차량 네트워크 공격 탐지 장치 및 그 방법 有权
    用于检测车辆网络的装置及其方法

    公开(公告)号:KR101371902B1

    公开(公告)日:2014-03-10

    申请号:KR1020120144900

    申请日:2012-12-12

    CPC classification number: H04L63/1425 H04L67/12

    Abstract: The present invention relates to a device for detecting an attack on a vehicle network and a method thereof and is to provide to a device for detecting an attack on a vehicle network and a method thereof which accumulatively counts packets by each device (ID) connected to a vehicle network bus, calculates the accumulated value by accumulating an inspected value (S) whenever accumulatively counting packets and determines that an attack is occurred if the average accumulated value calculated by dividing the accumulated value by the accumulated counting does not exceed a first threshold value. For the purpose, in a vehicle network environment in which devices, having a priority for packet transmission, connected to a vehicle network bus include: a packet collection unit for collecting packets transmitted through the vehicle network bus; a packet counting unit for accumulatively counting the number of packets collected by the packet collection unit; an inspected value calculation unit for calculating an inspected value based on a time difference between packets having the same ID; an accumulated value calculation unit for calculating an accumulated value by adding the inspected value which is calculated by the inspected value calculation unit to the previous inspected value; an average accumulated value calculation unit for calculating the average accumulated value by dividing the accumulated value calculated by the accumulated value calculation unit by accumulated counting value by the packet counting unit; and an attack determination unit for determining the existence of attack based on the average accumulated value calculated by the average accumulated value calculation unit. [Reference numerals] (10) Packet collection unit; (20) Packet counting unit; (30) Inspected value calculation unit; (40) Accumulated value calculation unit; (50) Average accumulated value calculation unit; (60) Attack determination unit; (70) Control unit

    Abstract translation: 本发明涉及一种用于检测车辆网络攻击的装置及其方法,并提供给用于检测对车辆网络的攻击的装置及其方法,其中每个装置(ID)对连接到车辆网络的数据进行累积计数 车辆网络总线,每当累积计数分组时累积检查值(S)来计算累积值,并且如果通过将累加值除以累加计数而计算的平均累积值不超过第一阈值,则确定发生攻击 。 为此,在车辆网络环境中,具有连接到车辆网络总线的分组传输优先级的设备包括:分组收集单元,用于收集通过车辆网络总线传送的分组; 分组计数单元,用于累积计数由所述分组收集单元收集的分组的数量; 检查值计算单元,用于基于具有相同ID的分组之间的时间差计算检查值; 累积值计算单元,用于通过将由检查值计算单元计算的检查值与先前检查值相加来计算累积值; 平均累计值计算单元,用于通过将由累积值计算单元计算出的累积值除以累积计数值来计算平均累积值; 以及攻击确定单元,用于基于由平均累积值计算单元计算的平均累积值来确定攻击的存在。 (附图标记)(10)分组收集单元; (20)分组计数单元; (30)检验价值计算单位; (40)累计值计算单位; (50)平均累计值计算单位; (60)攻击判定单元; (70)控制单元

Patent Agency Ranking