US 11,870,789 B2
Detection device, vehicle, detection method, and detection program
Yoshihiro Hamada, Osaka (JP); Hiroshi Ueda, Yokkaichi (JP); Naoki Adachi, Yokkaichi (JP); Shinichi Aiba, Yokkaichi (JP); Shogo Kamiguchi, Yokkaichi (JP); and Fumiya Ishikawa, Yokkaichi (JP)
Assigned to AUTONETWORKS TECHNOLOGIES, LTD., Mie (JP); SUMITOMO WIRING SYSTEMS, LTD., Mie (JP); and SUMITOMO ELECTRIC INDUSTRIES, LTD., Osaka (JP)
Appl. No. 17/622,086
Filed by AUTONETWORKS TECHNOLOGIES, LTD., Yokkaichi (JP); SUMITOMO WIRING SYSTEMS, LTD., Yokkaichi (JP); and SUMITOMO ELECTRIC INDUSTRIES, LTD., Osaka (JP)
PCT Filed May 19, 2020, PCT No. PCT/JP2020/019713
§ 371(c)(1), (2) Date Dec. 22, 2021,
PCT Pub. No. WO2021/065069, PCT Pub. Date Apr. 8, 2021.
Claims priority of application No. 2019-178176 (JP), filed on Sep. 30, 2019.
Prior Publication US 2022/0255954 A1, Aug. 11, 2022
Int. Cl. H04L 9/40 (2022.01); B60R 16/023 (2006.01); H04L 67/12 (2022.01)
CPC H04L 63/1416 (2013.01) [B60R 16/023 (2013.01); H04L 67/12 (2013.01)] 7 Claims
OG exemplary drawing
 
5. A detection method performed in a detection device configured to detect an unauthorized message in an in-vehicle network, the method comprising:
monitoring, as target messages, an authorized message being periodically transmitted and the unauthorized message in the in-vehicle network, and monitoring a reference message being periodically transmitted;
based on a monitoring result, calculating a time difference between a time corresponding to a transmission time of the target message and a time corresponding to a transmission time of the reference message; and
based on the calculated time difference, performing a detection process of detecting the unauthorized message, wherein
the authorized message and the reference message have different transmission cycles,
as the detection process, the performing includes determining whether or not the target message is an unauthorized message, according to a criterion,
performing the detection process while switching a plurality of criteria, and
a number of criteria to be used in the detection process is determined based on a least common multiple between the transmission cycle of the authorized message and the transmission cycle of the reference message, and on the transmission cycle of the authorized message.