SAE J 1760-2001 Data Security Services《数据安全服务》.pdf
《SAE J 1760-2001 Data Security Services《数据安全服务》.pdf》由会员分享,可在线阅读,更多相关《SAE J 1760-2001 Data Security Services《数据安全服务》.pdf(11页珍藏版)》请在麦多课文档分享上搜索。
1、SAE Technical Standards Board Rules provide that: “This report is published by SAE to advance the state of technical and engineering sciences. The use of this report is entirelyvoluntary, and its applicability and suitability for any particular use, including any patent infringement arising therefro
2、m, is the sole responsibility of the user.”SAE reviews each technical report at least every five years at which time it may be reaffirmed, revised, or cancelled. SAE invites your written comments and suggestions.TO PLACE A DOCUMENT ORDER: +1 (724) 776-4970 FAX: +1 (724) 776-0790SAE WEB ADDRESS http:
3、/www.sae.orgCopyright 2001 Society of Automotive Engineers, Inc.All rights reserved. Printed in U.S.A.SURFACEVEHICLE400 Commonwealth Drive, Warrendale, PA 15096-0001RECOMMENDEDPRACTICEJ1760ISSUEDDEC2001Issued 2001-12Data Security Services ForewordThe ISO/CD 15764 Road vehicles Extended data link sec
4、urity International Standard requiresSecurity Services for all data transfer between a vehicle and a diagnostic scan tool. In summary, this standardrequires Authentication of the scan tool and the vehicle by a Certification Authority and all communicationinterchange of data to use an encryption meth
5、od for every instance or session of use. The objective of this SAEJ1760 Recommended Practice is to require the use of these same Security Services modified by the Class ofSecurity required by the data to be exchanged as determined by the Resource Provider. This document requiresonly a one time Authe
6、ntication of Security Services for the installation of an IDB Device. For a backgrounddiscussion on the problem scenarios that require security, see Appendix A.TABLE OF CONTENTS1. Scope . 21.1 The IDB 31.2 IDB Device . 31.3 Classes of Security. 31.4 Theft Deterrent . 3 1.5 Compatible IDB Devices. 31
7、.6 Data Security Service Execution 42. References . 42.1 Applicable Documents 42.2 Related Publications . 43. Definitions. 43.1 Access 4 3.2 Authenticated Device . 4 3.3 Authentication . 43.4 Certification Authority . 43.5 Ciphertext . 43.6 Classes of Security. 53.7 Decryption 53.8 Device Resource P
8、rivileges 53.9 Eavesdropping . 53.10 Encryption 53.11 Hash Function 53.12 IDB Device . 5SAE J1760 Issued DEC2001-2-3.13 IDB Gateway.53.14 Manipulation .53.15 Masquerading .53.16 Passwords or PINs .53.17 Private Encryption Key .53.18 Private Key .53.19 Proxy.53.20 Public Encryption Key.53.21 Public K
9、ey .53.22 Resource Provider 53.23 Security Breach 53.24 Security Service53.25 Symmetric Key64. Abbreviations/Acronyms .65. Functional Requirements 65.1 Authentication .65.2 Access 65.3 Message Security .65.4 Security Breach Avoidance .65.5 Vehicle Device Transfer65.6 Usability 76. Security Model 76.
10、1 Security Levels of IDB Device Resources 76.2 Enabling Security86.3 Disabling Security .86.4 Process of authentication by Certification Authority .86.5 The Process to Establish an Ability to Conduct Secured Communication onthe IDB Network between Device Pairs9Appendix A Problem Scenarios that Requi
11、re Security. 10A.1 Background . 10A.2 Need for Data Security . 10A.3 Assure Proper Function 10A.4 Disable and discourage the use of stolen ITS modules 101. ScopeThe scope of this SAE Recommended Practice is to require the use of the same Security Services asdefined by the International Standard ISO/
12、CD 15764, modified by the Class of Security as determined by theresource provider and referenced in Table 1, Extended Data Link Security References.TABLE 1EXTENDED DATA LINK SECURITY INTERNATIONALSTANDARD ISO/CD 15764 REFERENCESParameter References ValuesHashing Function ISO/IEC 9797-2ISO/IEC 10118-
13、3Symmetric Key ANSI X 9.52 128 bitsPublic Key ISO/IEC 11770-1ISO/IEC 11770-31024 bits modulus1024 bits exponentPrivate Key ISO/IEC 11770-1 1024 bits modulus1024 bits exponentSAE J1760 Issued DEC2001-3-1.1 The IDB GatewayThe IDB Gateway shall be considered an IDB Device operating on the IDB network.
14、ThisSAE J1760 Data Security Services Recommended Practice defines security, when deemed necessary,between devices on the IDB, as granted by the resource providers. The Security Services required betweenthe IDB Gateway and the vehicle are not within the scope of this document.1.2 IDB Device Functions
15、The device functions may be represented by “proxy”. Therefore devices such asthose that are connected to the IDB may be a communication mechanism, external to the bounded vehiclecommunication system and shall by “proxy” be protected by the Authentication of Security Services required bythis document
16、. The Security Services required between the IDB network and outside the bounded vehiclecommunication system shall be within the scope of this document. (Reference Figure 1 for a data securityservices system diagram.)1.3 Classes of SecurityVarious capabilities (messages) shall be protected by differ
17、ent classes of security asrequired by 6.1. Security Services, which involve the transmission and/or reception of only Class 0 resources,are not within the scope of this document.1.4 Theft DeterrentThe data security services shall provide a mechanism that will discourage the theft of IDBDevices FIGUR
18、E 1DATA SECURITY SERVICE SYSTEM DIAGRAM1.5 Compatible IDB DevicesAll IDB Devices operating on the IDB network that claim to be IDB compatible andutilize resources from an IDB compatible device shall comply with the requirements set forth in thisRecommended Practice.SAE J1760 Issued DEC2001-4-1.6 Dat
19、a Security Service ExecutionThis Recommended Practice defines the functional requirements forproviding data security service execution with IDB Devices. The methods used in implementing these servicesare found in the ISO/CD 15764 Road vehicles Extended data link security International Standard.2. Re
20、ferences2.1 Applicable PublicationsThe following publications form a part of this specification to the extent specifiedherein. Unless otherwise indicated, the latest version of SAE publications shall apply.2.1.1 SAE PUBLICATIONAvailable from SAE, 400 Commonwealth Drive, Warrendale, PA 15096-0001SAE
21、J2355ITS Data Bus Architecture Reference Model2.1.2 ANSI PUBLICATIONAvailable from ANSI, 25 West 43rd Street, New York, NY 10036-8002ANSI X9.52American National Standard for Financial ServicesTriple Data Encryption AlgorithmModes of Operation2.1.3 ISO P UBLICATIONSAvailable from ANSI, 25 West 43rd S
22、treet, New York, NY 10036-8002.ISO/CD 15764Road vehiclesExtended data link securityISO/IEC9797-2Information technologySecurity techniquesData integrity mechanism using acryptographic check function emplopying a block cipher algorithmISO/IEC10118-3Information technologySecurity techniquesHash-functio
23、nsPart 3: Dedicatedhash-functionsISO/IEC 11770-1Information technologySecurity techniquesKey managementPart 1: FrameworkISO/IEC11770-3Information technologySecurity techniquesKey managementPart 3:Mechanisms using asymmetric techniques2.2 Related PublicationsThe following publications are provided fo
24、r information purposes only and are not arequired part of this document.2.2.1 SAE PUBLICATIONSAvailable from SAE, 400 Commonwealth Drive, Warrendale, PA 15096-0001.SAE J2366 and all its partsSAE J2367IDB GatewaySAE J2590PMODE for In-Vehicle Networks3. Definitions3.1 AccessThe process of retrieving d
- 1.请仔细阅读文档,确保文档完整性,对于不预览、不比对内容而直接下载带来的问题本站不予受理。
- 2.下载的文档,不会出现我们的网址水印。
- 3、该文档所得收入(下载+内容+预览)归上传者、原创作者;如果您是本文档原作者,请点此认领!既往收益都归您。
下载文档到电脑,查找使用更方便
10000 积分 0人已下载
下载 | 加入VIP,交流精品资源 |
- 配套讲稿:
如PPT文件的首页显示word图标,表示该PPT已包含配套word讲稿。双击word图标可打开word文档。
- 特殊限制:
部分文档作品中含有的国旗、国徽等图片,仅作为作品整体效果示例展示,禁止商用。设计者仅对作品中独创性部分享有著作权。
- 关 键 词:
- SAEJ17602001DATASECURITYSERVICES 数据 安全 服务 PDF
