US 12,272,185 B2
Vehicle diagnostic device, vehicle diagnostic system, and mobile body diagnostic device
Hikaru Maeda, Osaka (JP); Daisuke Yamahara, Osaka (JP); and Koichi Mitsushima, Osaka (JP)
Assigned to PANASONIC INTELLECTUAL PROPERTY MANAGEMENT CO., LTD., Osaka (JP)
Appl. No. 17/776,099
Filed by Panasonic Intellectual Property Management Co., Ltd., Osaka (JP)
PCT Filed Nov. 17, 2020, PCT No. PCT/JP2020/042863
§ 371(c)(1), (2) Date May 11, 2022,
PCT Pub. No. WO2021/100720, PCT Pub. Date May 27, 2021.
Claims priority of application No. 2019-209705 (JP), filed on Nov. 20, 2019.
Prior Publication US 2022/0383671 A1, Dec. 1, 2022
Int. Cl. G06F 21/56 (2013.01); G06F 21/52 (2013.01); G06F 21/55 (2013.01); G06F 21/57 (2013.01); G07C 5/00 (2006.01); G07C 5/08 (2006.01); B64U 101/26 (2023.01)
CPC G07C 5/0808 (2013.01) [G06F 21/52 (2013.01); G06F 21/55 (2013.01); G06F 21/57 (2013.01); G07C 5/008 (2013.01); B64U 2101/26 (2023.01)] 15 Claims
OG exemplary drawing
 
1. A vehicle diagnostic device comprising:
a communication unit that communicates with a vehicle which drives autonomously;
a light emitter that emits illumination light onto at least one of the vehicle, a road on which the vehicle travels, or a parking space in which the vehicle parks; and
a diagnostic unit that performs, via the communication unit, diagnosis of resilience of software which runs a travel system provided in the vehicle,
wherein the diagnostic unit performs the diagnosis of the resilience of the software by checking each of following states (1) to (5), respectively, as to whether the software is falls under any of the states:
(1) not resilient to a denial-of-service (DoS) attack;
(2) not resilient to simulated attacks of both the DoS attack and a buffer overflow attack;
(3) resilient to simulated attacks of both the DoS attack and the buffer overflow attack, but a backdoor is created to the software;
(4) resilient to simulated attacks of both the DoS attack and the buffer overflow attack, and no backdoor is created to the software; and
(5) resilient to simulated attacks of both the DoS attack and the buffer overflow attack, and to transmission of trap data.