US 12,103,478 B2
Vehicle system and information processing method
Kento Tamura, Kanagawa (JP); Jun Anzai, Kanagawa (JP); and Yoshiharu Imamoto, Kanagawa (JP)
Assigned to Panasonic Automotive Systems Co., Ltd., Kanagawa (JP)
Filed by Panasonic Intellectual Property Management Co., Ltd., Osaka (JP)
Filed on Apr. 23, 2021, as Appl. No. 17/239,187.
Application 17/239,187 is a continuation of application No. PCT/JP2019/022977, filed on Jun. 10, 2019.
Claims priority of application No. 2018-202629 (JP), filed on Oct. 29, 2018.
Prior Publication US 2021/0237665 A1, Aug. 5, 2021
Int. Cl. B60R 16/023 (2006.01); G06F 21/55 (2013.01); G07C 5/08 (2006.01)
CPC B60R 16/023 (2013.01) [G06F 21/554 (2013.01); G07C 5/085 (2013.01); G06F 2221/034 (2013.01)] 16 Claims
OG exemplary drawing
 
15. An information processing method performed by a vehicle system used for a vehicle, the vehicle including a plurality of in-vehicle apparatuses, the information processing method comprising:
storing, in a memory in advance, a predetermined penetration route, the predetermined penetration route defining an attack order of a malicious attack which is to be carried out on at least three of the plurality of in-vehicle apparatuses, the attack order identifying the at least three of the plurality of in-vehicle apparatuses sequentially from closest to furthest from an external network;
changing, in accordance with a depth of penetration of the malicious attack carried out on the at least three of the plurality of in-vehicle apparatuses included in the vehicle, at least one of a communication method with an outside of the vehicle, a defense method against the malicious attack, or a storage method for logs pertaining to the plurality of in-vehicle apparatuses; and
determining, by at least one of a controller or a processor, whether the malicious attack is being carried out based on anomaly detection in the plurality of in-vehicle apparatuses,
wherein the at least one of the controller or the processor determines that the malicious attack is being carried out when the anomaly detection matches the predetermined penetration route.