ImageVerifierCode 换一换
格式:PDF , 页数:3 ,大小:64.35KB ,
资源ID:1026769      下载积分:10000 积分
快捷下载
登录下载
邮箱/手机:
温馨提示:
如需开发票,请勿充值!快捷下载时,用户名和密码都是您填写的邮箱或者手机号,方便查询和重复下载(系统自动生成)。
如填写123,账号就是123,密码也是123。
特别说明:
请自助下载,系统不会自动发送文件的哦; 如果您已付费,想二次下载,请登录后访问:我的下载记录
支付方式: 支付宝扫码支付 微信扫码支付   
注意:如需开发票,请勿充值!
验证码:   换一换

加入VIP,免费下载
 

温馨提示:由于个人手机设置不同,如果发现不能下载,请复制以下地址【http://www.mydoc123.com/d-1026769.html】到电脑端继续下载(重复下载不扣费)。

已注册用户请登录:
账号:
密码:
验证码:   换一换
  忘记密码?
三方登录: 微信登录  

下载须知

1: 本站所有资源如无特殊说明,都需要本地电脑安装OFFICE2007和PDF阅读器。
2: 试题试卷类文档,如果标题没有明确说明有答案则都视为没有答案,请知晓。
3: 文件的所有权益归上传用户所有。
4. 未经权益所有人同意不得将文件中的内容挪作商业或盈利用途。
5. 本站仅提供交流平台,并不能对任何下载内容负责。
6. 下载文件中如有侵权或不适当内容,请与我们联系,我们立即纠正。
7. 本站不保证下载资源的准确性、安全性和完整性, 同时也不承担用户因使用这些下载资源对自己和他人造成任何形式的伤害或损失。

版权提示 | 免责声明

本文(SAE J 2186-1996 E E Data Link Security《E E数据链接安全》.pdf)为本站会员(李朗)主动上传,麦多课文库仅提供信息存储空间,仅对用户上传内容的表现方式做保护处理,对上载内容本身不做任何修改或编辑。 若此文所含内容侵犯了您的版权或隐私,请立即通知麦多课文库(发送邮件至master@mydoc123.com或直接QQ联系客服),我们立即给予删除!

SAE J 2186-1996 E E Data Link Security《E E数据链接安全》.pdf

1、SAE Technical Standards Board Rules provide that: “This report is published by SAE to advance the state of technical and engineering sciences. The use of this report is entirelyvoluntary, and its applicability and suitability for any particular use, including any patent infringement arising therefro

2、m, is the sole responsibility of the user.”SAE reviews each technical report at least every five years at which time it may be reaffirmed, revised, or cancelled. SAE invites your written comments and suggestions.Copyright 2005 SAE InternationalAll rights reserved. No part of this publication may be

3、reproduced, stored in a retrieval system or transmitted, in any form or by any means, electronic, mechanical, photocopying,recording, or otherwise, without the prior written permission of SAE.TO PLACE A DOCUMENT ORDER: Tel: 877-606-7323 (inside USA and Canada)Tel: 724-776-4970 (outside USA)Fax: 724-

4、776-0790Email: custsvcsae.orgSAE WEB ADDRESS: http:/www.sae.orgSURFACEVEHICLERECOMMENDEDPRACTICEJ2186REAF.JUN2005Issued 1991-09Reaffirmed 2005-06Superseding J2186 OCT1996E/E Data Link SecurityTABLE OF CONTENTS1. Scope . 11.1 Rationale 12. References . 12.1 Applicable Publications. 12.1.1 SAE Publica

5、tion 12.2 Related Publications. 22.2.1 SAE Publications 22.2.2 ISO Publications. 23. Definitions. 24. Technical Requirements . 24.1 Characteristics of Security 24.2 Functional Requirements 31. ScopeThis SAE Recommended Practice establishes a uniform practice for protecting vehicle componentsfrom “un

6、authorized“ access through a vehicle data link connector (DLC). The document defines a securitysystem for motor vehicle and tool manufacturers. It will provide flexibility to tailor systems to the security needsof the vehicle manufacturer. The vehicle modules addressed are those that are capable of

7、having solid statememory contents accessed or altered through the data link connector. Improper memory content alterationcould potentially damage the electronics or other vehicle modules; risk the vehicle compliance to governmentlegislated requirements; or risk the vehicle manufacturers security int

8、erests. This document does not implythat other security measures are not required nor possible.1.1 RationaleThis document has been reaffirmed to comply with the SAE 5-Year Review policy.2. References2.1 Applicable PublicationsThe following publications form a part of this specification to the extent

9、 specifiedherein. Unless otherwise indicated, the latest issue of SAE publications shall apply.2.1.1 SAE PUBLICATIONAvailable from SAE, 400 Commonwealth Drive, Warrendale, PA 15096-0001.SAE J2190Enhanced E/E Diagnostic Test ModesSAE J2186 Reaffirmed JUN2005-2-2.2 Related PublicationsThe following pu

10、blications are provided for information purposes only and are not arequired part of this document.2.2.1 SAE PUBLICATIONSAvailable from SAE, 400 Commonwealth Drive, Warrendale, PA 15096-0001.SAE J1850Class B Data Communication Network InterfaceSAE J1930Terms, Definitions, Abbreviations, and Acronyms2

11、.2.2 ISO PUBLICATIONSAvailable from ANSI, 25 West 43rd Street, New York, NY 10036-8002.ISO 9141-2Road vehiclesDiagnostic systemsCARB requirements for interchange of digitalinformationISO/DIS 14230Road vehiclesDiagnostic systemsKeyword protocol 20003. Definitions3.1 Unsecured FunctionsStandard diagno

12、stic functions that are provided by vehicle manufacturers such asread data parameters, diagnostic trouble codes, etc. These are controlled and protected by the on-vehiclecontroller. The unsecured capability may include reprogramming of selected items for which the reprogrammeris liable.3.2 Secured F

13、unctionsFunctions that require “Unlocking“ the on-vehicle controller to gain access. Typicalfunctions include programming of vehicle emission systems, vehicle theft, and odometer.3.3 SeedThe data value sent from the on-board controller to the access tool.3.4 KeyThe data value sent from the access to

14、ol to the on-board controller.4. Technical RequirementsProvide a method to access secured vehicle controller functions. Provide aprotection method for the seed/key algorithms in the access tool. “Unlocking“ of the controller shall be aprerequisite to access secured on-board controller functions. Thi

15、s permits the product software to protect itselfand the rest of the vehicle control system from unauthorized access. Different on-board functions may beprotected by separate seed/key relationships.This document does not attempt to define capability or information that is secured. The security system

16、 shallnot prevent access to unsecured functions between the external device and the on-board controller.4.1 Characteristics of SecurityThis security technique can be incorporated in any communications protocol.Special commands shall be provided via the DCL to “Unlock“ the on-board controller secured

17、 functions.There shall be three parameters which control the security access of the on-board controller and the securedtool:a. The “Seed“ and “Key“ shall each be a minimum of 2 bytes in length. Selection of the minimum numberof bytes will result in a minimum security level. Use of 4 or more bytes ar

18、e suggested when higherlevels of security are required.The relationship between the “Seed“ and “Key“ is the responsibility of the vehicle manufacturer.Multiple “Seed/Key“ relationships may exist for access to different functions within a controller, orsystems within a vehicle. As an example, refer t

19、o SAE J2190 mode $27.b. The Delay Time (DT) shall be a minimum of 10 s. The vehicle manufacturer may specify an increaseddelay time to suit its specific requirements.SAE J2186 Reaffirmed JUN2005-3-c. The Number of False Access Attempts (NFAA) shall be a maximum of two. The vehicle manufacturermay sp

20、ecify a reduced number of false attempts to suit its specific requirements. When the “Key“received by the controller is not correct, it shall be considered as a false access attempt. If access isrejected for any other reason, it shall not be considered a false access attempt.Disclosure of the “Seed/

21、Key“ relationship shall be limited to those persons as authorized by the vehiclemanufacturer.CAUTIONCare should be taken when selecting the values of all the parameters since their combinationdetermines the robustness of the security for an application or a system.4.2 Functional RequirementsTwo requ

22、est/response communication message pairs (Request #1/Response #1,Request #2/Response #2) shall be used to “Unlock“ the on-board controller. The specific message content isnot specified by this document and is the responsibility of the vehicle manufacturer.a. Step 1The external device shall request a

23、 “seed” from the on-board controller by sending Request#1. The controller shall respond by sending a “Seed“ using Response #1. A seed value of zero shallindicate that the controller is currently unlocked.b. Step 2The external device shall respond by returning a “Key“ number back to the controller us

24、ingRequest #2. The controller shall compare this “Key“ to one internally determined and issue Response#2.If the two numbers agree, then the controller shall enable (“Unlock“) the external devices access to securedcommunication modes. If, upon “NFAA“ attempts, the two keys do not compare (false attem

25、pt), then the controller and the tool shallinsert the “DT“ time delay before allowing further attempts. The “DT“ time delay shall also be required at eachcontroller and tool power-on.The tool shall automatically insert the delay time (DT) prior to requesting a new seed for any reason.Three on-board

26、controller responses shall be decoded by the external device:a. AcceptThe controller has “Unlocked“ its access.b. Invalid KeyThe access attempt was rejected because the key was determined to be invalid by thecontroller. The access attempt was false.c. Process ErrorThe access attempt was rejected for

27、 reasons other than receiving the wrong key. Thisshall not be counted as a false access attempt.Termination of security access, “Locking“ the product, shall result after any of the following conditions:a. Each time the controller is powered up.b. Upon commanding the product to a normal operational m

28、ode.c. Conditions at the vehicle manufacturers discretion.If an attempt is made to communicate with a “Locked“ on-board controller and access a “Secured“ function, thecontroller may return a special response indicating that the controller is “Locked“ and cannot respond asrequested.PREPARED BY THE SAE VEHICLE E/E SYSTEMS DIAGNOSTICS STANDARDS COMMITTEE

copyright@ 2008-2019 麦多课文库(www.mydoc123.com)网站版权所有
备案/许可证编号:苏ICP备17064731号-1