US20070005197A1 - System for vehicle component management, system for vehicle component management data update, and vehicle component management center - Google Patents

System for vehicle component management, system for vehicle component management data update, and vehicle component management center Download PDF

Info

Publication number
US20070005197A1
US20070005197A1 US11/516,503 US51650306A US2007005197A1 US 20070005197 A1 US20070005197 A1 US 20070005197A1 US 51650306 A US51650306 A US 51650306A US 2007005197 A1 US2007005197 A1 US 2007005197A1
Authority
US
United States
Prior art keywords
vehicle
component
certain
management data
unit
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Abandoned
Application number
US11/516,503
Inventor
Hiroaki Ito
Ifushi Shimonomoto
Toshio Shimomura
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Denso Corp
Original Assignee
Denso Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Denso Corp filed Critical Denso Corp
Priority to US11/516,503 priority Critical patent/US20070005197A1/en
Publication of US20070005197A1 publication Critical patent/US20070005197A1/en
Abandoned legal-status Critical Current

Links

Images

Classifications

    • G06Q50/40
    • BPERFORMING OPERATIONS; TRANSPORTING
    • B60VEHICLES IN GENERAL
    • B60RVEHICLES, VEHICLE FITTINGS, OR VEHICLE PARTS, NOT OTHERWISE PROVIDED FOR
    • B60R25/00Fittings or systems for preventing or indicating unauthorised use or theft of vehicles
    • BPERFORMING OPERATIONS; TRANSPORTING
    • B60VEHICLES IN GENERAL
    • B60RVEHICLES, VEHICLE FITTINGS, OR VEHICLE PARTS, NOT OTHERWISE PROVIDED FOR
    • B60R25/00Fittings or systems for preventing or indicating unauthorised use or theft of vehicles
    • B60R25/20Means to switch the anti-theft system on or off
    • B60R25/24Means to switch the anti-theft system on or off using electronic identifiers containing a code not memorised by the user

Definitions

  • the present invention relates to a method and system for vehicle component management, a method and system for vehicle component management data update, and a vehicle component management center.
  • Patent Document 1 describes the following anti-theft system.
  • a vehicle is equipped with an anti-theft device or an anti-theft component such as an immobilizer.
  • the anti-theft device is for outputting an alarm by detecting a door opened and closed or the like by an unauthorized person.
  • These anti-theft objects are periodically communicated with communications devices so that disassembling of these objects can be detected to thereby activate alarms.
  • the communications between the anti-theft objects and the communications devices becomes anomalous, it is determined that these anti-theft objects are stolen. The alarms are thereby outputted.
  • Patent Document 1 JP2003-137071 A
  • the vehicle equipped with the above systems can detect using the anti-theft device a door opened and closed by an unauthorized person to thereby notify it, or prevent using the anti-theft component an unauthorized person from starting an engine. Further, disassembling or destroying the anti-theft objects can be detected to then activate an alarm, so that theft of the vehicle or the in-vehicle devices can be properly prevented.
  • a vehicle component management system manages a plurality of components included in an in-vehicle system that is provided in a vehicle for achieving a certain function.
  • a storing unit is included for storing, as component management data, unique identification codes that are assigned to the respective components included in the in-vehicle system.
  • An identification code obtaining unit is included for obtaining, when the in-vehicle system is started, identification codes from components included in the in-vehicle system.
  • a determining unit is included for determining whether the obtained identification codes accord with the identification codes stored as the component management data.
  • a prohibiting unit is further included for prohibiting a certain component from being used, when the certain component is present.
  • the certain component has an identification code that does not accord with any one of the identification codes stored as the component management data.
  • a vehicle component management data update system updates component management data of a certain vehicle by using a management center when a component in an in-vehicle system in the certain vehicle is substituted or added.
  • the certain vehicle includes the above-described component management system, while the management center is accessed to via a communications network.
  • the management center includes a vehicle database that is registered with, as vehicle data, identification codes of entire components included in the in-vehicle system with respect to each of vehicles that are shipped from an assembling factory.
  • the vehicle component management data update system includes an obtaining unit, an inquiring unit, and an updating unit.
  • the obtaining unit obtains an identification code of a new component of a target for one of substitution and addition.
  • the inquiring unit inquires whether the new component is enabled to be usable in the certain vehicle, by transmitting the obtained identification code to the management center via the communications network.
  • the updating unit updates the component management data stored in a storing unit in the component management system based on the obtained identification code, when a response that the new component is enabled to be usable is received.
  • the updating unit then causes the management center to update the vehicle data of the certain vehicle that is registered in the vehicle database.
  • component management data can be updated. That is, when a stolen component is assembled as the new component, the component management data cannot be updated. This securely prevents use of a stolen component. Further, when a component is changed, a vehicle database in the management center can be also updated. This enables the management center to accurately manage components in the in-vehicle systems in the vehicles that are shipped from an assembling factory.
  • a vehicle component management center is provided with the following.
  • the vehicle component management center is used for updating component management data of a certain vehicle via the above-described management data update system, when a component in an in-vehicle system in the certain vehicle is substituted or added.
  • the certain vehicle includes the above-described component management system.
  • the vehicle component management center includes a vehicle database, a responding unit, and an updating unit.
  • the vehicle database is registered with, as the vehicle data, identification codes of entire components included in the in-vehicle system with respect to each of vehicles that are shipped from an assembling factory.
  • the responding unit transmits a respond as a determination result to the management data update system after determining using the vehicle database whether the new component is enabled to be usable in the certain vehicle when the identification code of the new component that is to be used in the certain vehicle is transmitted from the management data update system via the communications network.
  • the updating unit then updates the vehicle data of the certain vehicle that is registered in the vehicle database, based on the identification code of the new component, when an update instruction is received from the management data update system via the communications network.
  • FIG. 1 is a block diagram showing peripheral devices for managing vehicles and their control system components according to an embodiment of the present invention
  • FIG. 2 is a flow chart showing an authentication process executed by each of in-vehicle ECUs at start-up;
  • FIG. 3A is an explanatory diagram of a data structure of a component database provided in a management center
  • FIG. 3B is an explanatory diagram of a data structure of a vehicle database provided in a management center
  • FIG. 4 is a flow chart showing a data update process executed by a terminal and a computer in a management center
  • FIG. 5 is a flow chart showing an ID-code update process executed by each of in-vehicle ECUs.
  • FIG. 1 shows a vehicle 2 and its peripheral devices for managing components of a system of the vehicle 2 , according to an embodiment of the present invention.
  • a control system of the vehicle 2 includes an engine ECU (Electronic Control Unit) 12 that controls an engine, a VSC-ECU 14 that controls a bearing and braking of the vehicle 2 , an ACC-ECU 16 that causes the vehicle 2 to follow a preceding vehicle, and an ECT-ECU 18 that controls shifts of an automatic transmission.
  • ECU Electronic Control Unit
  • Each of the ECUs 12 to 18 includes as a storing unit a data rewritable EEPROM 12 a to 18 a of non-volatile memory.
  • Each of the EEPROMs 12 a to 18 a is registered with authentication IDs of other control system ECUs 12 to 18 as component management data via the communications line 4 when the vehicle 2 is assembled in an assembling factory.
  • the EEPROM 12 a of the engine ECU 12 is registered with authentication IDs (B-07, S-32, U-20, etc.) of the VSC-ECU 14 , the ACC-ECU 16 , the ECT-ECU 18 and the like as the component management data.
  • the EEPROM 14 a of the VSC-ECU 14 is registered with authentication IDs (A-03, S-32, U-20, etc.) of the engine-ECU 12 , the ACC-ECU 16 , the ECT-ECU 18 and the like as the component management data.
  • Each of these ECUs 12 to 18 performs an authentication process at start-up (shown in FIG. 2 ) by using an internal micro-computer, for instance, when a key switch of the vehicle 2 is operated into an accessory position prior to an engine start.
  • Step 110 authentication IDs are obtained from other ECUs 12 to 18 via the communications line 4 .
  • Step 120 it is determined whether the entire obtained authentication IDs accord with authentication IDs registered as the component management data in the internal EEPROM. When it is determined that the entire obtained authentication IDs accord with the registered authentication IDs, it is determined that the entire ECUs 12 to 18 connected with the communications line 4 are regular (or authorized) components, then advancing the process to Step 130 .
  • a usual control process is executed; then, the start-up authentication process is terminated.
  • Step 140 an ECU that does not accord with the registered ID is designated as an irregular ECU, so that transmitting an instruction for stopping operation to this irregular ECU to thereby prohibit it from being operated.
  • Step 150 an irregular-control process is started that performs the control without communicating with the ECU designated as the irregular ECU; then, the start-up authentication process is terminated.
  • each of the ECUs 12 to 18 of the embodiment obtains authentication IDs of the other ECUs at the system start-up.
  • an authentication ID of a given ECU within the other ECUs is determined to be not according with any one of the authentication IDs registered as the component management data stored in an own internal EEPROM of the each of the ECUs 12 to 18 , the given ECU is prohibited from being operated. An own control process is then executed without using the given ECU.
  • each of the ECUs 12 to 18 transmits its authentication ID to a certain ECU when the certain ECU requires the authentication ID during the start-up authentication process or after start of the control process.
  • the communications line 4 of the vehicle 2 can be connected with a terminal 50 as a component management data update system via a connector 6 .
  • the terminal 50 is used for the following case. That is, when, for enhancing functionality of the vehicle 2 , any one of the ECUs 12 to 18 is substituted or a new ECU is added, it is confirmed that a substituted or added new ECU is not irregular component such as a stolen object, using an external vehicle component management center 30 . Further, when the new ECU is not irregular component, the component management data (i.e., authentication IDs of other ECUs) registered in the respective EEPROMs 12 a to 18 a within the ECUs 12 to 18 including the new ECU are updated via the communications line 4 .
  • the component management data i.e., authentication IDs of other ECUs
  • the terminal 50 includes: a center communications IF (interface) 52 performing a data communications with the management center 30 using a given public communications network 70 (e.g., public phone lines, the Internet); a vehicle communications IF 54 performing a data communications with the respective ECUs 12 to 18 of the vehicle 2 ; an input device 56 inputting data or various instructions by external operations; a display device 58 displaying various information; and an update computer 60 connected with various portions for updating the component management data.
  • a center communications IF interface
  • a vehicle communications IF 54 performing a data communications with the respective ECUs 12 to 18 of the vehicle 2
  • an input device 56 inputting data or various instructions by external operations
  • a display device 58 displaying various information
  • an update computer 60 connected with various portions for updating the component management data.
  • the management center 30 includes: a component database 32 that is registered with authentication IDs being authentication codes unique to the respective ECUs with respect to each of kinds of ECUs (A, B, . . . ) (shown in FIG. 3A ) that are shipped from a component factory; a vehicle database 34 that is registered with authentication IDs of the entire control-system constituting ECUs with respect to each of vehicles shipped from the assembling factory; and a management computer 40 for managing the authentication IDs of the respective components and the vehicle data that are registered in the database 32 , 34 .
  • a component database 32 that is registered with authentication IDs being authentication codes unique to the respective ECUs with respect to each of kinds of ECUs (A, B, . . . ) (shown in FIG. 3A ) that are shipped from a component factory
  • a vehicle database 34 that is registered with authentication IDs of the entire control-system constituting ECUs with respect to each of vehicles shipped from the assembling factory
  • a management computer 40 for managing the authentication IDs of
  • the management center 30 includes: an input device 36 for inputting data or various instructions to the management computer 40 ; a display device 38 for displaying information outputted from the management computer 40 ; and a communications IF 42 that performs a data communications with other information devices including the terminal 50 via the public communications network 70 .
  • the management computer 40 When component data or vehicle data is received from data registry information devices disposed in an assembling factory or a component factory via the public communications network 70 , the management computer 40 automatically registers the component database 32 or the vehicle database 34 with the received data.
  • the vehicle database with respect to each of the vehicles registered in the vehicle database 34 includes a change-permission flag indicating whether a change relating to components or ECUs of the control system is permitted or not.
  • Each vehicle owner can set or reset the change-permission flag by notifying the management center 30 of whether change of an ECU of an own vehicle is permitted or not by using a phone or the like.
  • the change-permission flag is used as permission information.
  • An initial value is set to a reset state (0) for prohibiting change of a control system of each vehicle.
  • a change-permission flag of “VEHICLE 001 ” shown in FIG. 3B becomes a set state (1).
  • the management computer 40 of the management center 30 performs an authentication process to determine whether a terminal 50 is regular or authorized when the terminal 50 accesses the management center 30 so as to update component management data registered in the EEPROM 12 a to 18 a of the ECUs 12 to 18 of the vehicle 2 .
  • the management computer 40 searches the component database 32 or the vehicle database 34 to reply a result or performs a vehicle data update process for updating the vehicle data of the vehicle 2 in the vehicle database 34 .
  • the update computer 60 of the terminal 50 is connected with the communications line 4 via the connector 6 .
  • an update instruction for the component management data is manually inputted via the input device 56 while the ECUs 12 to 18 of the vehicle 2 are being activated, the update computer 60 accesses the management center 30 .
  • a registry data update process is performed to activate the vehicle data update process in the management center 30 .
  • the ECUs 12 to 18 When the control system is started up under a condition where the communications line 4 of the vehicle 2 is connected with the terminal 50 via the connector 6 , the ECUs 12 to 18 perform given authentication processes, respectively. Here, it is determined whether the terminal 50 connected with the communications line 4 is usable or regular for updating the relevant control system. When the terminal 50 is determined to be usable for updating, a registry ID update process shown in FIG. 5 is executed.
  • each ECU 12 to 18 waits for a request signal for an authentication ID or a registry data update instruction, both of which are transmitted from the terminal 50 based on the registry data update process shown in FIG. 4 .
  • the request signal for the authentication ID is received (Step 210 : YES)
  • an own authentication ID stored in the ROM is transmitted to the terminal 50 (Step S 220 ).
  • the registry data update instruction request is received (Step 230 : YES)
  • the update data that is to be transmitted from the terminal 50 is then received (Step 240 ).
  • the registry data (or component management data) in the own EEPROM is updated (Step 250 ).
  • the authentication IDs of the ECUs 12 to 18 are obtained by transmitting the request signal for the authentication IDs to the ECUs 12 to 18 .
  • the obtained authentication IDs are transmitted to the management center 30 .
  • the management computer 40 in the management center 30 performs a reception process that receives the entire authenticated IDs transmitted from the terminal 50 .
  • the process then proceeds to Step 520 , where the corresponding vehicle is designated by searching the vehicle database 34 .
  • Step 530 whether the change of the control system is permitted is determined by determining whether the change-permission flag with respect to the vehicle data of the vehicle designated at Step 520 is set.
  • the vehicle data update process is terminated.
  • the process advances to Step 540 , where the change permission is transmitted to the terminal 50 .
  • the update computer 60 in the terminal 50 determines whether the change permission is received from the management center 30 via the center communications IF 52 at Step 330 , after a given period elapses from transmitting the authentication IDs to the management center 30 .
  • the given period is more than a necessary period for the management center 30 to transmit the change permission.
  • Step 330 When the change permission from the management center 30 is determined to be not received at Step 330 , the control system of the vehicle 2 is prohibited from being changed by the vehicle owner. The registry data update process is thereby terminated. By contrast, when the change permission from the management center 30 is determined to be received at Step 330 , the process advances to Step 340 . Here, an authentication ID of a new ECU that is to be substituted or added in the control system of the vehicle 2 is obtained, so that the obtained ID is then transmitted to the management center 30 at Step 350 .
  • the display device 58 displays a message urging a user to input an authentication ID of the new ECU that is to be substituted or added.
  • the authentication ID is obtained by reading the authentication ID inputted by the user using the input device 56 .
  • Step 540 After the management computer 40 of the management center 30 transmits the change permission at Step 540 , the process advances to S 550 , where a reception process is performed to receive the authentication ID of the new ECU transmitted from the terminal 50 .
  • the process advances to Step 560 .
  • Step 560 it is determined that the new ECU is enabled to be usable in the vehicle 2 under a condition where the authentication ID of the new ECU is registered in the component database 32 and not registered in the vehicle database 34 .
  • the new ECU is assumed to be not regular component that is shipped from the component factory.
  • the new ECU is assumed to be stolen from a certain vehicle or to be duplicated from that of the certain vehicle. Therefore, at Step 560 , under the condition where the authentication ID of the new ECU is registered in the component database 32 and not registered in the vehicle database 34 , the new ECU is determined to be enabled to be usable in the vehicle 2 .
  • Step 560 when the new ECU is determined to be not enabled to be usable in the vehicle 2 , the vehicle data update process is terminated without any further process. Otherwise, when the new ECU is determined to be enabled to be usable in the vehicle 2 , the process advances to Step 570 , where a use permission of the new ECU is transmitted to the terminal 50 .
  • the update computer 60 in the terminal 50 determines whether a user permission from the management center 30 is received by the center IF 52 at Step 360 after a given period elapsed from when the authentication ID of the new ECU is transmitted to the management center 30 .
  • Step 360 When a user permission from the management center 30 is determined to be not received at Step 360 , it is determined that the new ECU cannot be use in the vehicle 2 . The vehicle data update process is thereby terminated without any further process. Otherwise, when a user permission from the management center 30 is determined to be received at Step 360 , the process advances to Step 370 . In this step, the display device 58 displays that the change of the new ECU is permitted, so that the user is urged to substitute or add the new ECU.
  • Step 380 it is determined whether the change instruction is inputted via the input device 56 . That is, an input of the change instruction is awaited.
  • the process advances to Step 390 , where an update instruction for the vehicle data is transmitted to the management center 30 .
  • the management computer 40 of the management center 30 executes at Step 580 a reception process that receives the update instruction transmitted from the terminal 50 after transmitting the use permission at Step 570 . As the update instruction is received in this reception process, the process advances to Step 590 .
  • Step 590 the vehicle data of the vehicle designated at Step 520 is updated based on the authentication ID of the new ECU received at Step 550 .
  • Step 600 an update result of the vehicle data is transmitted to the terminal 50 , so that the vehicle data update process is terminated.
  • an ECU kind of the new ECU is initially recognized form the authentication ID of the new ECU.
  • a substitution of ECU is determined.
  • the vehicle data is thereby rewritten using the authentication ID of the new ECU.
  • an addition of a new ECU kind is determined.
  • the authentication ID of the new ECU is thereby added to the vehicle data.
  • the update computer 60 of the terminal 50 executes, at Step 400 , a reception process that receives the update result transmitted from the management center 30 after transmitting the update instruction to the management center 30 at Step 390 . As the update result is received in this reception process, the process advances to Step 410 .
  • registry data update instructions and update data are successively transmitted to the ECUs mounted in the vehicle, based on the received update result.
  • the registry data i.e., component management data
  • the registry data registered in the EEPROMs of the respective ECUs are updated, so that the registry data update process is terminated.
  • respective ECUs 12 to 18 determine whether other ECUs are regular or not.
  • the given ECU is prohibited from being used and, further, the following process takes place. That is, when an ECU constituting the control system of the vehicle 2 is replaced or a new ECU is added, component management data registered in the respective EEPROMs of the ECUs are updated so that the respective ECUs constituting the changed control system can authenticate the other ECUs by using a dedicated terminal that is provided as a body separated from the vehicle 2 .
  • the terminal 50 updates the registry data (component management data)
  • the terminal 50 confirms, using the management center 30 , that an owner of the vehicle 2 permits a change of the control system and a new ECU substituted or added is not irregularly obtained. After this confirmation, the registry data in respective EEPROMs of the ECUs are updated.
  • this embodiment securely prevents an ECU stolen from another vehicle from being assembled and used in the vehicle 2 , resulting in decrease in a vehicle theft occurrence rate.
  • the present invention can be directed to any in-vehicle system that includes multiple components without any limitation.
  • respective ECUs constituting a control system of a vehicle authenticate other ECUs.
  • a specific ECU such as an engine ECU can authenticate other ECUs.
  • a gateway that connects networks for an in-vehicle control system and an in-vehicle body system can supervise each of the components connected with the networks.

Abstract

Each of ECUs constituting a system of a vehicle is registered with authentication IDs of other ECUs. The each of ECUs determines whether the other ECUs are regular by comparing the registered IDs with authentication IDs newly obtained from the other ECUs when the system is started. When a certain ECU within the other ECUs is determined to be not regular, the certain ECU is prohibited from being used in this system. Further, when a new ECU is substituted or added, a terminal confirms whether the new ECU is unused in another vehicle and is thereby enabled to be usable by transmitting an authentication ID of the new ECU to a management center. When the new ECU is confirmed to be enabled to be usable, authentication IDs registered in the respective ECUs are updated.

Description

    CROSS REFERENCE TO RELATED APPLICATIONS
  • This application is based on and incorporates herein by reference Japanese Patent Application No. 2004-3205 filed on Jan. 18, 2004.
  • FIELD OF THE INVENTION
  • The present invention relates to a method and system for vehicle component management, a method and system for vehicle component management data update, and a vehicle component management center.
  • BACKGROUND OF THE INVENTION
  • For instance, Patent Document 1 describes the following anti-theft system. A vehicle is equipped with an anti-theft device or an anti-theft component such as an immobilizer. For instance, the anti-theft device is for outputting an alarm by detecting a door opened and closed or the like by an unauthorized person. These anti-theft objects are periodically communicated with communications devices so that disassembling of these objects can be detected to thereby activate alarms. When the communications between the anti-theft objects and the communications devices becomes anomalous, it is determined that these anti-theft objects are stolen. The alarms are thereby outputted.
  • Patent Document 1: JP2003-137071 A
  • The vehicle equipped with the above systems can detect using the anti-theft device a door opened and closed by an unauthorized person to thereby notify it, or prevent using the anti-theft component an unauthorized person from starting an engine. Further, disassembling or destroying the anti-theft objects can be detected to then activate an alarm, so that theft of the vehicle or the in-vehicle devices can be properly prevented.
  • However, even in the above vehicle, when the communications device or a device for outputting the alarm by detecting anomaly in the communications is disassembled or destroyed, the alarm cannot be outputted. This cannot securely prevent the theft of the vehicle. In particular, a malicious thief tries to steal a vehicle and cannibalize its components for selling to obtain an illegal profit. The cannibalized components can be used in other vehicles, so that the above-described countermeasure cannot eradicate such a theft.
  • SUMMARY OF THE INVENTION
  • It is an object of the present invention to decrease thief's motivation to steal a vehicle or in-vehicle component, by disabling the thief from cannibalizing vehicle components for other vehicles. This additionally decreases an occurrence rate of vehicle theft.
  • To achieve the above object, a vehicle component management system is provided with the following. The vehicle component management system manages a plurality of components included in an in-vehicle system that is provided in a vehicle for achieving a certain function. A storing unit is included for storing, as component management data, unique identification codes that are assigned to the respective components included in the in-vehicle system. An identification code obtaining unit is included for obtaining, when the in-vehicle system is started, identification codes from components included in the in-vehicle system. A determining unit is included for determining whether the obtained identification codes accord with the identification codes stored as the component management data. A prohibiting unit is further included for prohibiting a certain component from being used, when the certain component is present. Here, the certain component has an identification code that does not accord with any one of the identification codes stored as the component management data.
  • In this structure, when an irregular component such as a stolen component is assembled in a vehicle, the irregular component cannot be used. Consequently, a thief cannot sell a component stolen from a vehicle, so that a vehicle theft occurrence rate can be decreased.
  • In another aspect of the present invention, a vehicle component management data update system is provided with the following. The vehicle component management data update system updates component management data of a certain vehicle by using a management center when a component in an in-vehicle system in the certain vehicle is substituted or added. Here, the certain vehicle includes the above-described component management system, while the management center is accessed to via a communications network. Further, here, the management center includes a vehicle database that is registered with, as vehicle data, identification codes of entire components included in the in-vehicle system with respect to each of vehicles that are shipped from an assembling factory. Further, the vehicle component management data update system includes an obtaining unit, an inquiring unit, and an updating unit. The obtaining unit obtains an identification code of a new component of a target for one of substitution and addition. The inquiring unit inquires whether the new component is enabled to be usable in the certain vehicle, by transmitting the obtained identification code to the management center via the communications network. The updating unit updates the component management data stored in a storing unit in the component management system based on the obtained identification code, when a response that the new component is enabled to be usable is received. The updating unit then causes the management center to update the vehicle data of the certain vehicle that is registered in the vehicle database.
  • In this structure, in a case where a new component in an in-vehicle system is substituted or added, only when the new component is unused in another vehicle, component management data can be updated. That is, when a stolen component is assembled as the new component, the component management data cannot be updated. This securely prevents use of a stolen component. Further, when a component is changed, a vehicle database in the management center can be also updated. This enables the management center to accurately manage components in the in-vehicle systems in the vehicles that are shipped from an assembling factory.
  • In another aspect of the present invention, a vehicle component management center is provided with the following. The vehicle component management center is used for updating component management data of a certain vehicle via the above-described management data update system, when a component in an in-vehicle system in the certain vehicle is substituted or added. Here, the certain vehicle includes the above-described component management system. Further, the vehicle component management center includes a vehicle database, a responding unit, and an updating unit. The vehicle database is registered with, as the vehicle data, identification codes of entire components included in the in-vehicle system with respect to each of vehicles that are shipped from an assembling factory. The responding unit transmits a respond as a determination result to the management data update system after determining using the vehicle database whether the new component is enabled to be usable in the certain vehicle when the identification code of the new component that is to be used in the certain vehicle is transmitted from the management data update system via the communications network. The updating unit then updates the vehicle data of the certain vehicle that is registered in the vehicle database, based on the identification code of the new component, when an update instruction is received from the management data update system via the communications network.
  • In this structure, when an identification code of a new component is transmitted from the component management data update system, it is determined whether the identification code is registered in the vehicle database. It is thereby determined whether the new component is assembled in another vehicle, so that a determination result is replied to the component management data update system. Further, when an update instruction for vehicle data is transmitted from the component management data update system, vehicle data of a relevant vehicle can be updated based on the identification code of the new component. The vehicle database can be thereby maintained at the latest state.
  • BRIEF DESCRIPTION OF THE DRAWINGS
  • The above and other objects, features, and advantages of the present invention will become more apparent from the following detailed description made with reference to the accompanying drawings. In the drawings:
  • FIG. 1 is a block diagram showing peripheral devices for managing vehicles and their control system components according to an embodiment of the present invention;
  • FIG. 2 is a flow chart showing an authentication process executed by each of in-vehicle ECUs at start-up;
  • FIG. 3A is an explanatory diagram of a data structure of a component database provided in a management center;
  • FIG. 3B is an explanatory diagram of a data structure of a vehicle database provided in a management center;
  • FIG. 4 is a flow chart showing a data update process executed by a terminal and a computer in a management center; and
  • FIG. 5 is a flow chart showing an ID-code update process executed by each of in-vehicle ECUs.
  • DETAILED DESCRIPTION OF THE PREFERRED EMBODIMENTS
  • FIG. 1 shows a vehicle 2 and its peripheral devices for managing components of a system of the vehicle 2, according to an embodiment of the present invention. As shown in FIG. 1, a control system of the vehicle 2 includes an engine ECU (Electronic Control Unit) 12 that controls an engine, a VSC-ECU 14 that controls a bearing and braking of the vehicle 2, an ACC-ECU 16 that causes the vehicle 2 to follow a preceding vehicle, and an ECT-ECU 18 that controls shifts of an automatic transmission. These components or ECUs 12 to 18 perform data communications with each other via a communications line 4 that forms an in-vehicle LAN.
  • Each of the ECUs 12 to 18 includes as a storing unit a data rewritable EEPROM 12 a to 18 a of non-volatile memory. Each of the EEPROMs 12 a to 18 a is registered with authentication IDs of other control system ECUs 12 to 18 as component management data via the communications line 4 when the vehicle 2 is assembled in an assembling factory.
  • For instance, the EEPROM 12 a of the engine ECU 12 is registered with authentication IDs (B-07, S-32, U-20, etc.) of the VSC-ECU 14, the ACC-ECU 16, the ECT-ECU 18 and the like as the component management data. By contrast, the EEPROM 14 a of the VSC-ECU 14 is registered with authentication IDs (A-03, S-32, U-20, etc.) of the engine-ECU 12, the ACC-ECU 16, the ECT-ECU 18 and the like as the component management data.
  • Each of these ECUs 12 to 18 performs an authentication process at start-up (shown in FIG. 2) by using an internal micro-computer, for instance, when a key switch of the vehicle 2 is operated into an accessory position prior to an engine start.
  • In detail, in this start-up authentication process, at Step 110, authentication IDs are obtained from other ECUs 12 to 18 via the communications line 4. At Step 120, it is determined whether the entire obtained authentication IDs accord with authentication IDs registered as the component management data in the internal EEPROM. When it is determined that the entire obtained authentication IDs accord with the registered authentication IDs, it is determined that the entire ECUs 12 to 18 connected with the communications line 4 are regular (or authorized) components, then advancing the process to Step 130. Here, a usual control process is executed; then, the start-up authentication process is terminated.
  • By contrast, when it is determined that the entire obtained authentication IDs do not accord with any one of the registered authentication IDs, the process advances to Step 140. Here, an ECU that does not accord with the registered ID is designated as an irregular ECU, so that transmitting an instruction for stopping operation to this irregular ECU to thereby prohibit it from being operated. At subsequent Step 150, an irregular-control process is started that performs the control without communicating with the ECU designated as the irregular ECU; then, the start-up authentication process is terminated.
  • Thus, each of the ECUs 12 to 18 of the embodiment obtains authentication IDs of the other ECUs at the system start-up. When an authentication ID of a given ECU within the other ECUs is determined to be not according with any one of the authentication IDs registered as the component management data stored in an own internal EEPROM of the each of the ECUs 12 to 18, the given ECU is prohibited from being operated. An own control process is then executed without using the given ECU.
  • Consequently, when an irregular or stolen ECU that is even able to normally operate is assembled to the control system in the vehicle 2, the irregular ECU becomes unable to be used in this system. Adopting this control system of the embodiment to various vehicles disables a thief from selling an ECU stolen from a vehicle, which can decrease an occurrence rate of vehicle theft.
  • Further, each of the ECUs 12 to 18 transmits its authentication ID to a certain ECU when the certain ECU requires the authentication ID during the start-up authentication process or after start of the control process.
  • Next, the communications line 4 of the vehicle 2 can be connected with a terminal 50 as a component management data update system via a connector 6. The terminal 50 is used for the following case. That is, when, for enhancing functionality of the vehicle 2, any one of the ECUs 12 to 18 is substituted or a new ECU is added, it is confirmed that a substituted or added new ECU is not irregular component such as a stolen object, using an external vehicle component management center 30. Further, when the new ECU is not irregular component, the component management data (i.e., authentication IDs of other ECUs) registered in the respective EEPROMs 12 a to 18 a within the ECUs 12 to 18 including the new ECU are updated via the communications line 4.
  • To achieve this object, the terminal 50 includes: a center communications IF (interface) 52 performing a data communications with the management center 30 using a given public communications network 70 (e.g., public phone lines, the Internet); a vehicle communications IF 54 performing a data communications with the respective ECUs 12 to 18 of the vehicle 2; an input device 56 inputting data or various instructions by external operations; a display device 58 displaying various information; and an update computer 60 connected with various portions for updating the component management data.
  • By contrast, the management center 30 includes: a component database 32 that is registered with authentication IDs being authentication codes unique to the respective ECUs with respect to each of kinds of ECUs (A, B, . . . ) (shown in FIG. 3A) that are shipped from a component factory; a vehicle database 34 that is registered with authentication IDs of the entire control-system constituting ECUs with respect to each of vehicles shipped from the assembling factory; and a management computer 40 for managing the authentication IDs of the respective components and the vehicle data that are registered in the database 32, 34.
  • Further, the management center 30 includes: an input device 36 for inputting data or various instructions to the management computer 40; a display device 38 for displaying information outputted from the management computer 40; and a communications IF 42 that performs a data communications with other information devices including the terminal 50 via the public communications network 70.
  • When component data or vehicle data is received from data registry information devices disposed in an assembling factory or a component factory via the public communications network 70, the management computer 40 automatically registers the component database 32 or the vehicle database 34 with the received data.
  • Further, the vehicle database with respect to each of the vehicles registered in the vehicle database 34 includes a change-permission flag indicating whether a change relating to components or ECUs of the control system is permitted or not. Each vehicle owner can set or reset the change-permission flag by notifying the management center 30 of whether change of an ECU of an own vehicle is permitted or not by using a phone or the like.
  • Here, the change-permission flag is used as permission information. An initial value is set to a reset state (0) for prohibiting change of a control system of each vehicle. When the owner notifies the management center 30 of a change permission for an ECU of the own vehicle, a change-permission flag of “VEHICLE 001” shown in FIG. 3B becomes a set state (1).
  • Next, the management computer 40 of the management center 30 performs an authentication process to determine whether a terminal 50 is regular or authorized when the terminal 50 accesses the management center 30 so as to update component management data registered in the EEPROM 12 a to 18 a of the ECUs 12 to 18 of the vehicle 2. After completing the authentication of the terminal 50, according to request from the terminal 50, the management computer 40 searches the component database 32 or the vehicle database 34 to reply a result or performs a vehicle data update process for updating the vehicle data of the vehicle 2 in the vehicle database 34.
  • The update computer 60 of the terminal 50 is connected with the communications line 4 via the connector 6. When an update instruction for the component management data is manually inputted via the input device 56 while the ECUs 12 to 18 of the vehicle 2 are being activated, the update computer 60 accesses the management center 30. After a communications line with the management center 30 is established, a registry data update process is performed to activate the vehicle data update process in the management center 30.
  • Hereinbelow, the registry data update process executed by the update computer 60 in the terminal 50, and the vehicle data update process executed by the management computer 40 in the management center 30 will be explained with reference to a flow chart in FIG. 4
  • When the control system is started up under a condition where the communications line 4 of the vehicle 2 is connected with the terminal 50 via the connector 6, the ECUs 12 to 18 perform given authentication processes, respectively. Here, it is determined whether the terminal 50 connected with the communications line 4 is usable or regular for updating the relevant control system. When the terminal 50 is determined to be usable for updating, a registry ID update process shown in FIG. 5 is executed.
  • In this registry ID update process in the vehicle 2, each ECU 12 to 18 waits for a request signal for an authentication ID or a registry data update instruction, both of which are transmitted from the terminal 50 based on the registry data update process shown in FIG. 4. When the request signal for the authentication ID is received (Step 210: YES), an own authentication ID stored in the ROM is transmitted to the terminal 50 (Step S220). When the registry data update instruction request is received (Step 230: YES), the update data that is to be transmitted from the terminal 50 is then received (Step 240). Based on the received update data, the registry data (or component management data) in the own EEPROM is updated (Step 250).
  • As shown in FIG. 4, in the registry data update process executed by the update computer 60 in the terminal 50, at Step 310, the authentication IDs of the ECUs 12 to 18 are obtained by transmitting the request signal for the authentication IDs to the ECUs 12 to 18. At subsequent Step 320, the obtained authentication IDs are transmitted to the management center 30.
  • By contrast, after authenticating the terminal 50 to then start the vehicle data update process, the management computer 40 in the management center 30 performs a reception process that receives the entire authenticated IDs transmitted from the terminal 50. The process then proceeds to Step 520, where the corresponding vehicle is designated by searching the vehicle database 34.
  • At Step 530, whether the change of the control system is permitted is determined by determining whether the change-permission flag with respect to the vehicle data of the vehicle designated at Step 520 is set. When the change of the control system is not permitted, the vehicle data update process is terminated. By contrast, when the change of the control system is permitted, the process advances to Step 540, where the change permission is transmitted to the terminal 50.
  • Further, the update computer 60 in the terminal 50 determines whether the change permission is received from the management center 30 via the center communications IF 52 at Step 330, after a given period elapses from transmitting the authentication IDs to the management center 30. Here, the given period is more than a necessary period for the management center 30 to transmit the change permission.
  • When the change permission from the management center 30 is determined to be not received at Step 330, the control system of the vehicle 2 is prohibited from being changed by the vehicle owner. The registry data update process is thereby terminated. By contrast, when the change permission from the management center 30 is determined to be received at Step 330, the process advances to Step 340. Here, an authentication ID of a new ECU that is to be substituted or added in the control system of the vehicle 2 is obtained, so that the obtained ID is then transmitted to the management center 30 at Step 350.
  • Here, when the authentication ID of the new ECU is obtained, the display device 58 displays a message urging a user to input an authentication ID of the new ECU that is to be substituted or added. The authentication ID is obtained by reading the authentication ID inputted by the user using the input device 56.
  • Next, after the management computer 40 of the management center 30 transmits the change permission at Step 540, the process advances to S550, where a reception process is performed to receive the authentication ID of the new ECU transmitted from the terminal 50. When the authentication ID is received in this reception process, the process advances to Step 560.
  • At Step 560, it is determined that the new ECU is enabled to be usable in the vehicle 2 under a condition where the authentication ID of the new ECU is registered in the component database 32 and not registered in the vehicle database 34.
  • That is, when the authentication ID of the new ECU is not registered in the component database 32, the new ECU is assumed to be not regular component that is shipped from the component factory. When the authentication ID of the new ECU is registered in the vehicle database 34, the new ECU is assumed to be stolen from a certain vehicle or to be duplicated from that of the certain vehicle. Therefore, at Step 560, under the condition where the authentication ID of the new ECU is registered in the component database 32 and not registered in the vehicle database 34, the new ECU is determined to be enabled to be usable in the vehicle 2.
  • At Step 560, when the new ECU is determined to be not enabled to be usable in the vehicle 2, the vehicle data update process is terminated without any further process. Otherwise, when the new ECU is determined to be enabled to be usable in the vehicle 2, the process advances to Step 570, where a use permission of the new ECU is transmitted to the terminal 50.
  • Therefore, the update computer 60 in the terminal 50 determines whether a user permission from the management center 30 is received by the center IF 52 at Step 360 after a given period elapsed from when the authentication ID of the new ECU is transmitted to the management center 30.
  • When a user permission from the management center 30 is determined to be not received at Step 360, it is determined that the new ECU cannot be use in the vehicle 2. The vehicle data update process is thereby terminated without any further process. Otherwise, when a user permission from the management center 30 is determined to be received at Step 360, the process advances to Step 370. In this step, the display device 58 displays that the change of the new ECU is permitted, so that the user is urged to substitute or add the new ECU.
  • Here, after the display device 58 displays that the change of the new ECU is permitted, the user once stops the control system in the vehicle 2 to substitute or add the new ECU. The user then re-starts the control system to then input a change instruction via the input device 56. At subsequent Step 380, it is determined whether the change instruction is inputted via the input device 56. That is, an input of the change instruction is awaited. When the change instruction is determined to be inputted, the process advances to Step 390, where an update instruction for the vehicle data is transmitted to the management center 30.
  • The management computer 40 of the management center 30 executes at Step 580 a reception process that receives the update instruction transmitted from the terminal 50 after transmitting the use permission at Step 570. As the update instruction is received in this reception process, the process advances to Step 590.
  • At this Step 590, the vehicle data of the vehicle designated at Step 520 is updated based on the authentication ID of the new ECU received at Step 550. At subsequent Step 600, an update result of the vehicle data is transmitted to the terminal 50, so that the vehicle data update process is terminated.
  • Here, at this Step 590, when the vehicle data is updated, an ECU kind of the new ECU is initially recognized form the authentication ID of the new ECU. When the same kind ECU as the new ECU is present within the ECUs mounted so far in the vehicle, a substitution of ECU is determined. The vehicle data is thereby rewritten using the authentication ID of the new ECU. By contrast, when the same kind ECU is not present within the ECUs mounted so far, an addition of a new ECU kind is determined. The authentication ID of the new ECU is thereby added to the vehicle data.
  • The update computer 60 of the terminal 50 executes, at Step 400, a reception process that receives the update result transmitted from the management center 30 after transmitting the update instruction to the management center 30 at Step 390. As the update result is received in this reception process, the process advances to Step 410.
  • At this Step 410, registry data update instructions and update data are successively transmitted to the ECUs mounted in the vehicle, based on the received update result. The registry data (i.e., component management data) registered in the EEPROMs of the respective ECUs are updated, so that the registry data update process is terminated.
  • As explained above, in this embodiment, at start-up of a control system of a vehicle 2, respective ECUs 12 to 18 determine whether other ECUs are regular or not. When a given ECU within the other ECUs is determined to be not regular, the given ECU is prohibited from being used and, further, the following process takes place. That is, when an ECU constituting the control system of the vehicle 2 is replaced or a new ECU is added, component management data registered in the respective EEPROMs of the ECUs are updated so that the respective ECUs constituting the changed control system can authenticate the other ECUs by using a dedicated terminal that is provided as a body separated from the vehicle 2.
  • Further, when the terminal 50 updates the registry data (component management data), the terminal 50 confirms, using the management center 30, that an owner of the vehicle 2 permits a change of the control system and a new ECU substituted or added is not irregularly obtained. After this confirmation, the registry data in respective EEPROMs of the ECUs are updated.
  • Accordingly, this embodiment securely prevents an ECU stolen from another vehicle from being assembled and used in the vehicle 2, resulting in decrease in a vehicle theft occurrence rate.
  • Modification
  • For instance, in the above embodiment, multiple ECUs constituting a control system of a vehicle authenticate each other, so that an irregular component such as a stolen ECU is prevented from being used. However, the present invention can be directed to any in-vehicle system that includes multiple components without any limitation.
  • In the above embodiment, respective ECUs constituting a control system of a vehicle authenticate other ECUs. However, a specific ECU such as an engine ECU can authenticate other ECUs. Otherwise, a gateway that connects networks for an in-vehicle control system and an in-vehicle body system can supervise each of the components connected with the networks.
  • It will be obvious to those skilled in the art that various changes may be made in the above-described embodiments of the present invention. However, the scope of the present invention should be determined by the following claims.

Claims (11)

1. (canceled)
2. A vehicle component management system for managing a plurality of components included in an in-vehicle system that is provided in a vehicle for achieving a certain function, the vehicle component management system comprising:
a storing unit that stores, as component management data, unique identification codes that are assigned to the respective components included in the in-vehicle system;
an identification code obtaining unit that obtains, when the in-vehicle system is started, identification codes from components included in the in-vehicle system;
a determining unit that determines whether the obtained identification codes accord with the identification codes stored as the component management data; and
a prohibiting unit that prohibits, when a certain component whose identification code does not accord with any one of the identification codes stored as the component management data is present, the certain component from being used.
3. The vehicle component management system of claim 2,
wherein components are provided in the in-vehicle system to perform data communications with each other via a network in the vehicle, and
wherein the identification code obtaining unit obtains identification codes from components included in the in-vehicle system, via the network in the vehicle.
4. The vehicle component management system of claim 2,
wherein the storing unit, the identification code obtaining unit, the determining unit, and the prohibiting unit are provided for each of the components,
wherein, when the in-vehicle system is started, with respect to the each of the components, the identification code obtaining unit obtains identification codes from other components included in the in-vehicle system, and
wherein the determining unit determines whether the obtained identification codes accord with identification codes that are stored as the component management data and correspond to other components included in the in-vehicle system.
5. (canceled)
6. (canceled)
7. A vehicle component management data update system for updating component management data of a certain vehicle by using a management center when a component in an in-vehicle system in the certain vehicle is substituted or added,
wherein the certain vehicle includes a component management system including:
a storing unit that stores, as the component management data, identification codes that are assigned to respective components included in the in-vehicle system in the certain vehicle;
an identification code obtaining unit that obtains, when the in-vehicle system is started, identification codes from components included in the in-vehicle system in the certain vehicle;
a determining unit that determines whether the obtained identification codes accord with the identification codes stored as the component management data; and
a prohibiting unit that prohibits, when a certain component whose identification code does not accord with any one of the identification codes stored as the component management data is present, the certain component from being used,
wherein the management center that is accessed to via a communications network and that includes:
a vehicle database that is registered with, as vehicle data, identification codes of entire components included in the in-vehicle system with respect to each of vehicles that are shipped from an assembling factory and includes the certain vehicle,
the vehicle component management data update system comprising:
an obtaining unit that obtains an identification code of a new component of a target for one of substitution and addition;
an inquiring unit that inquires whether the new component is enabled to be usable in the certain vehicle by transmitting the obtained identification code to the management center via the communications network; and
an updating unit that updates, when a response that the new component is enabled to be usable is received, the component management data stored in the storing unit based on the obtained identification code, and then causes the management center to update the vehicle data of the certain vehicle that is registered in the vehicle database.
8. The vehicle component management data update system of claim 7,
wherein the vehicle database includes permission information representing whether a change of the in-vehicle system is permitted with respect to each of the vehicles, and
wherein, when the new component in the in-vehicle system in the certain vehicle is substituted or added, the inquiring unit inquires whether the change of the in-vehicle system is permitted or not in the certain vehicle in addition to whether the new component is enabled to be usable in the certain vehicle, and
wherein the updating unit updates, when a response that the new component is enabled to be usable in the certain vehicle and that the change of the in-vehicle system is permitted in the certain vehicle is received, the component management data stored in the storing unit based on the identification code of the new component, and then causes the management center to update the vehicle data of the certain vehicle that is registered in the vehicle database.
9. A vehicle component management center used for updating component management data of a certain vehicle via a management data update system when a component in an in-vehicle system in the certain vehicle is substituted or added,
wherein the certain vehicle includes a component management system including:
a storing unit that stores, as the component management data, identification codes that are assigned to respective components included in the in-vehicle system in the certain vehicle;
an identification code obtaining unit that obtains, when the in-vehicle system is started, identification codes from components included in the in-vehicle system in the certain vehicle;
a determining unit that determines whether the obtained identification codes accord with the identification codes stored as the component management data; and
a prohibiting unit that prohibits, when a certain component whose identification code does not accord with any one of the identification codes stored as the component management data is present, the certain component from being used,
wherein the management data update system includes:
an obtaining unit that obtains an identification code of a new component of a target for one of substitution and addition;
an inquiring unit that inquires whether the new component is enabled to be usable in the certain vehicle by transmitting the obtained identification code to the vehicle component management center via a communications network; and
an updating unit that updates, when a response that the new component is enabled to be usable is received, the component management data stored in the storing unit based on the obtained identification code, and then causes the vehicle component management center to update vehicle data of the certain vehicle that is registered in a vehicle database, by transmitting an update instruction,
the vehicle component management center comprising:
the vehicle database that is registered with, as the vehicle data, identification codes of entire components included in the in-vehicle system with respect to each of vehicles that are shipped from an assembling factory and includes the certain vehicle;
a responding unit that transmits the respond as a determination result to the management data update system after determining using the vehicle database whether the new component is enabled to be usable in the certain vehicle when the identification code of the new component that is to be used in the certain vehicle is transmitted from the management data update system via the communications network; and
an updating unit that then updates the vehicle data of the certain vehicle that is registered in the vehicle database, based on the identification code of the new component, when the update instruction is received from the management data update system via the communications network.
10. The vehicle component management center of claim 9, further comprising:
a component database that is registered with identification codes shipped from a component factory,
wherein the responding unit determines whether the new component is enabled to be usable in the certain vehicle by using the vehicle database and the component database, when the identification code of the new component that is to be used in the certain vehicle is transmitted from the management data update system via the communications network.
11. The vehicle component management center of claim 9,
wherein the vehicle database is provided with permission information representing whether a change of the in-vehicle system is permitted or not, with respect to each of the vehicles, and
wherein the responding unit transmits the respond as a determination result to the management data update system after determining whether the change of the in-vehicle system in the certain vehicle is permitted or not based on the permission information when the identification code of the new component that is to be used in the certain vehicle is transmitted from the management data update system via the communications network.
US11/516,503 2004-01-08 2006-09-07 System for vehicle component management, system for vehicle component management data update, and vehicle component management center Abandoned US20070005197A1 (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
US11/516,503 US20070005197A1 (en) 2004-01-08 2006-09-07 System for vehicle component management, system for vehicle component management data update, and vehicle component management center

Applications Claiming Priority (4)

Application Number Priority Date Filing Date Title
JP2004003205A JP2005196568A (en) 2004-01-08 2004-01-08 Method and device for vehicle component management, method and device for updating vehicle component management data, and vehicle component management center
JP2004-3205 2004-01-08
US11/004,968 US7415332B2 (en) 2004-01-08 2004-12-07 Method and system for vehicle component management, method and system for vehicle component management data update, and vehicle component management center
US11/516,503 US20070005197A1 (en) 2004-01-08 2006-09-07 System for vehicle component management, system for vehicle component management data update, and vehicle component management center

Related Parent Applications (1)

Application Number Title Priority Date Filing Date
US11/004,968 Division US7415332B2 (en) 2004-01-08 2004-12-07 Method and system for vehicle component management, method and system for vehicle component management data update, and vehicle component management center

Publications (1)

Publication Number Publication Date
US20070005197A1 true US20070005197A1 (en) 2007-01-04

Family

ID=34737143

Family Applications (2)

Application Number Title Priority Date Filing Date
US11/004,968 Expired - Fee Related US7415332B2 (en) 2004-01-08 2004-12-07 Method and system for vehicle component management, method and system for vehicle component management data update, and vehicle component management center
US11/516,503 Abandoned US20070005197A1 (en) 2004-01-08 2006-09-07 System for vehicle component management, system for vehicle component management data update, and vehicle component management center

Family Applications Before (1)

Application Number Title Priority Date Filing Date
US11/004,968 Expired - Fee Related US7415332B2 (en) 2004-01-08 2004-12-07 Method and system for vehicle component management, method and system for vehicle component management data update, and vehicle component management center

Country Status (5)

Country Link
US (2) US7415332B2 (en)
JP (1) JP2005196568A (en)
KR (1) KR20050073405A (en)
CN (1) CN100399309C (en)
DE (1) DE102005000999A1 (en)

Cited By (15)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20080114508A1 (en) * 2006-11-04 2008-05-15 Dr. Ing. H.C. F. Porsche Aktiengesellschaft Method for Repairing Vehicle Electronics of a Motor Vehicle
US20090288175A1 (en) * 2008-05-14 2009-11-19 Sun chun-yi Electronic anti-theft system for vehicle components
US20110107120A1 (en) * 2009-11-02 2011-05-05 Sony Corporation Information processing apparatus, power supply control method, program and power supply control system
US20110102136A1 (en) * 2009-11-02 2011-05-05 Sony Corporation Information processing apparatus, power-supply control method, program, and power-supply control system
US20110112718A1 (en) * 2008-05-23 2011-05-12 Bayerische Motoren Werke Aktiengesellschaft On-board network system of a motor vehicle and process for operating the on-board network system
WO2012171759A1 (en) * 2011-06-14 2012-12-20 Siemens Aktiengesellschaft Method and verifying control unit for verifying vehicle components
US8830031B2 (en) 2006-07-11 2014-09-09 Komatsu Ltd. System for monitoring component of operating machine
US20150095997A1 (en) * 2012-05-29 2015-04-02 Toyota Jidosha Kabushiki Kaisha Authentication system and authentication method
US9215228B1 (en) 2014-06-17 2015-12-15 Cisco Technology, Inc. Authentication of devices having unequal capabilities
US9334820B2 (en) 2006-07-11 2016-05-10 Komatsu Ltd. Working machine component monitoring system
US9380044B2 (en) 2014-09-10 2016-06-28 Cisco Technology, Inc. Supporting differentiated secure communications among heterogeneous electronic devices
WO2018111842A1 (en) * 2016-12-15 2018-06-21 Caterpillar Inc. Lifecycle tracking for machine components
US10541875B2 (en) 2013-12-11 2020-01-21 Komatsu Ltd. Work machine, management system and management method
US10915069B2 (en) 2018-07-26 2021-02-09 Caterpillar Inc. Monitoring system for monitoring usage of uniquely identifiable machine components
US11444939B2 (en) 2017-07-10 2022-09-13 Sumitomo Electric Industries, Ltd. Authentication control device, authentication control method, and authentication control program

Families Citing this family (72)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
DE10238093B4 (en) * 2002-08-21 2007-10-18 Audi Ag Vehicle controller
DE102005024818A1 (en) * 2005-05-27 2006-11-30 Daimlerchrysler Ag Method for safeguarding use of identifiable devices in vehicle includes facility whereby interruption-control command switches non-identifiable device into emergency operating mode
JP4701977B2 (en) * 2005-10-06 2011-06-15 株式会社デンソー In-vehicle network diagnosis system and in-vehicle control device
GB2434219B (en) * 2005-11-15 2010-11-24 P G Drives Technology Ltd Networked modules
US8131605B2 (en) * 2006-02-28 2012-03-06 Caterpillar Inc. Machine having automatic component registration
US7515998B1 (en) * 2006-04-24 2009-04-07 Raytheon Company Information layer for a vehicular control network and method
DE102007044586B3 (en) * 2007-09-19 2009-07-09 Knorr-Bremse Systeme für Nutzfahrzeuge GmbH Control unit and method for identifying spare parts of a vehicle
US20090119657A1 (en) * 2007-10-24 2009-05-07 Link Ii Charles M Methods and systems for software upgrades
KR101102916B1 (en) * 2009-09-07 2012-01-11 자동차부품연구원 Realtime test and analysis system of a driving car
KR101029872B1 (en) * 2009-11-26 2011-04-21 주식회사 케피코 Install history data management method of control unit for vehicle
IT1399197B1 (en) * 2010-03-30 2013-04-11 St Microelectronics Srl SYSTEM TO IDENTIFY THE COMPONENTS OF A VEHICLE
US8841881B2 (en) 2010-06-02 2014-09-23 Bryan Marc Failing Energy transfer with vehicles
JP5765539B2 (en) * 2010-09-27 2015-08-19 日本電気株式会社 Information processing system, vehicle check method, and vehicle check program
JP5120437B2 (en) * 2010-10-19 2013-01-16 トヨタ自動車株式会社 In-vehicle device, vehicle authentication system, and data communication method
CN102029958A (en) * 2010-12-16 2011-04-27 深圳市元征软件开发有限公司 Vehicle-mounted electronic device and method for mutually authenticating identities of vehicle-mounted electronic device and vehicle engine
US9285944B1 (en) 2011-04-22 2016-03-15 Angel A. Penilla Methods and systems for defining custom vehicle user interface configurations and cloud services for managing applications for the user interface and learned setting functions
US9123035B2 (en) 2011-04-22 2015-09-01 Angel A. Penilla Electric vehicle (EV) range extending charge systems, distributed networks of charge kiosks, and charge locating mobile apps
US10217160B2 (en) 2012-04-22 2019-02-26 Emerging Automotive, Llc Methods and systems for processing charge availability and route paths for obtaining charge for electric vehicles
US20130030920A1 (en) 2011-07-26 2013-01-31 Gogoro, Inc. Apparatus, method and article for providing information regarding availability of power storage devices at a power storage device collection, charging and distribution machine
ES2701751T3 (en) 2011-07-26 2019-02-25 Gogoro Inc Apparatus, method and article for authentication, security and control of energy storage devices, such as batteries, based on user profiles
US8862388B2 (en) 2011-07-26 2014-10-14 Gogoro, Inc. Apparatus, method and article for providing locations of power storage device collection, charging and distribution machines
JP6162696B2 (en) 2011-07-26 2017-07-12 ゴゴロ インク Apparatus, method and article for power storage device compartment
TWI485572B (en) 2011-07-26 2015-05-21 睿能創意公司 Apparatus, method and article for physical security of power storage devices in vehicles
WO2013016555A2 (en) 2011-07-26 2013-01-31 Gogoro, Inc. Apparatus, method and article for redistributing power storage devices, such as batteries, between collection, charging and distribution machines
US10186094B2 (en) 2011-07-26 2019-01-22 Gogoro Inc. Apparatus, method and article for providing locations of power storage device collection, charging and distribution machines
CN103891089B (en) 2011-07-26 2016-10-12 睿能创意公司 The device of certification, safety and control, method and article for the power storage device such as battery etc
EP3340131B1 (en) 2011-07-26 2023-01-25 Gogoro Inc. Dynamically limiting vehicle operation for best effort economy
US9424697B2 (en) 2011-07-26 2016-08-23 Gogoro Inc. Apparatus, method and article for a power storage device compartment
JP6058665B2 (en) 2011-07-26 2017-01-11 ゴゴロ インク Apparatus, method and article for collecting, charging and distributing power storage devices such as batteries
US9830753B2 (en) 2011-07-26 2017-11-28 Gogoro Inc. Apparatus, method and article for reserving power storage devices at reserving power storage device collection, charging and distribution machines
JP5651615B2 (en) * 2012-02-16 2015-01-14 日立オートモティブシステムズ株式会社 In-vehicle network system
US20130261927A1 (en) * 2012-03-28 2013-10-03 Delphi Technologies, Inc. System and method to authenticate an automotive engine device
JP5956244B2 (en) * 2012-05-10 2016-07-27 株式会社東海理化電機製作所 Mobile device registration system
CN102789485A (en) * 2012-06-28 2012-11-21 用友软件股份有限公司 Uninterrupted code management device and uninterrupted code management method
CN104968529B (en) 2012-11-16 2017-09-05 睿能创意公司 Installation method and article for automotive turn signal
CN103824342A (en) * 2012-11-16 2014-05-28 中国移动通信集团公司 Method for detecting binding between vehicle-mounted terminal and vehicle, vehicle-mounted terminal and user identification unit
CN103108043B (en) * 2013-01-31 2018-01-23 厦门雅迅网络股份有限公司 A kind of method that application data library file adaptively gathers ECU messages
US9854438B2 (en) 2013-03-06 2017-12-26 Gogoro Inc. Apparatus, method and article for authentication, security and control of portable charging devices and power storage devices, such as batteries
US11710105B2 (en) 2013-03-12 2023-07-25 Gogoro Inc. Apparatus, method and article for changing portable electrical power storage device exchange plans
US11222485B2 (en) 2013-03-12 2022-01-11 Gogoro Inc. Apparatus, method and article for providing information regarding a vehicle via a mobile device
US8798852B1 (en) * 2013-03-14 2014-08-05 Gogoro, Inc. Apparatus, system, and method for authentication of vehicular components
US11075530B2 (en) 2013-03-15 2021-07-27 Gogoro Inc. Modular system for collection and distribution of electric storage devices
US9770996B2 (en) 2013-08-06 2017-09-26 Gogoro Inc. Systems and methods for powering electric vehicles using a single or multiple power cells
WO2015021195A1 (en) 2013-08-06 2015-02-12 Gogoro Taiwan Limited Adjusting electric vehicle systems based on an electrical energy storage device thermal profile
DE102013219105A1 (en) 2013-09-24 2015-03-26 Robert Bosch Gmbh Method for the automatic detection of control units in battery management systems
US9124085B2 (en) 2013-11-04 2015-09-01 Gogoro Inc. Apparatus, method and article for power storage device failure safety
EP3065977B1 (en) 2013-11-08 2020-02-26 Gogoro Inc. Apparatus, method and article for providing vehicle event data
EP3097626B1 (en) 2014-01-23 2019-03-20 Gogoro Inc. Systems and methods for utilizing an array of power storage devices, such as batteries
FR3018056B1 (en) * 2014-03-03 2016-02-19 Peugeot Citroen Automobiles Sa METHOD AND DEVICE FOR RECORDING A DEVICE FOR REMOTE CONTROL OF A VEHICLE WITH A VARIABLE RECORDING TIME
TWI603552B (en) 2014-08-11 2017-10-21 睿能創意公司 Multidirectional electrical connector, plug and system
USD789883S1 (en) 2014-09-04 2017-06-20 Gogoro Inc. Collection, charging and distribution device for portable electrical energy storage devices
US10500955B2 (en) * 2014-12-30 2019-12-10 Visteon Global Technologies, Inc. Automatic upgrade of a vehicle-based processor based on a physical component change
TWI668139B (en) 2015-06-05 2019-08-11 英屬開曼群島商睿能創意公司 A vehicle, a method of determining a particular type of load of an electric vehicle, and a non-transitory computer readable storage medium
JP6437937B2 (en) * 2016-02-17 2018-12-12 日立建機株式会社 Work machine
CN112087519A (en) * 2016-04-12 2020-12-15 伽德诺克斯信息技术有限公司 Specially programmed computing system with associated devices configured to implement security lockout and methods of use thereof
JP6665728B2 (en) * 2016-08-05 2020-03-13 株式会社オートネットワーク技術研究所 In-vehicle update device, in-vehicle update system and communication device update method
CN106469474A (en) * 2016-09-05 2017-03-01 上海科世达-华阳汽车电器有限公司 A kind of method of road vehicle component service condition monitoring
US10353691B2 (en) 2016-09-30 2019-07-16 Cummins Inc. Updating electronic controller through telematics
JP6724717B2 (en) * 2016-10-25 2020-07-15 株式会社オートネットワーク技術研究所 In-vehicle device determination system
EP3439264B1 (en) * 2017-08-01 2021-06-02 Panasonic Intellectual Property Corporation of America Management system, vehicle, and information processing method
JP7069975B2 (en) 2018-03-30 2022-05-18 トヨタ自動車株式会社 Controls, programs for controls, and control methods
US11373457B2 (en) * 2018-11-06 2022-06-28 Zf Friedrichshafen Ag System and method for detecting non-approved parts in a vehicle
CN113366803B (en) * 2019-02-18 2022-08-19 株式会社自动网络技术研究所 In-vehicle communication device, storage medium, and communication method
US11240006B2 (en) * 2019-03-25 2022-02-01 Micron Technology, Inc. Secure communication for a key exchange
US11210267B2 (en) * 2019-05-22 2021-12-28 Ford Global Technologies, Llc Electronic control unit comparison
JP7419992B2 (en) * 2020-07-02 2024-01-23 トヨタ自動車株式会社 Software update device, method, program and vehicle
US11465638B2 (en) 2020-10-26 2022-10-11 Toyota Motor Engineering & Manufacturing North America, Inc. System and method for modulating a performance of a vehicle with modified vehicle components
CN112801243A (en) * 2020-12-31 2021-05-14 鲨湾科技(上海)有限公司 Method and system for determining associated information of production serial number of electric bicycle part
CN114124533A (en) * 2021-11-24 2022-03-01 山西大鲲智联科技有限公司 Data interception method and device, electronic equipment and computer readable medium
CN114856846B (en) * 2022-05-09 2023-10-20 潍柴动力股份有限公司 Method and device for arranging master ECU and slave ECU for vehicle, processor, and vehicle
CN115086366B (en) * 2022-05-27 2024-01-05 中国第一汽车股份有限公司 Configuration method and device of vehicle-mounted equipment, storage medium and vehicle
CN116781263B (en) * 2023-08-23 2023-10-20 合肥工业大学 Identity authentication and secret key self-updating method among in-vehicle ECUs and readable storage medium

Citations (19)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5796329A (en) * 1995-07-20 1998-08-18 Siemens Aktiengesellschaft Immobilizer and method for initializing the immobilizer
US20010002814A1 (en) * 1999-12-07 2001-06-07 Takeshi Suganuma Control information rewriting system
US20010049569A1 (en) * 2000-03-29 2001-12-06 Helmar-Steffen Gehrke Device for exchanging data with a motor vehicle
US20020038222A1 (en) * 2000-09-19 2002-03-28 Seiko Epson Corporation Optional part for apparatus, apparatus having optional part, access device, method for distributing optical part and ink cartridge
US6377860B1 (en) * 1998-07-31 2002-04-23 Sun Microsystems, Inc. Networked vehicle implementing plug and play with javabeans
US20020087240A1 (en) * 2000-11-21 2002-07-04 Mathias Raithel Method for documentation of data for a vehicle
US20030080619A1 (en) * 2001-10-29 2003-05-01 Visteon Global Technologies, Inc. Communication network for an automobile
US20030120395A1 (en) * 2001-12-21 2003-06-26 General Motors Corporation Method and system for managing vehicle control modules through telematics
US20040002799A1 (en) * 2002-06-28 2004-01-01 Dabbish Ezzat A. Method and system for maintaining a configuration history of a vehicle
US20040015272A1 (en) * 2000-05-16 2004-01-22 Vasco Vollmer Method for integrating a device into a vehicle communications network
US20040044454A1 (en) * 2002-07-12 2004-03-04 General Motors Corporation Method and system for implementing vehicle personalization
US20050075759A1 (en) * 2003-09-18 2005-04-07 Denso Corporation Information processing system
US20050090941A1 (en) * 2003-10-22 2005-04-28 General Motors Corporation Telematics based programming gateway
US6927676B2 (en) * 2003-08-01 2005-08-09 Daimlerchrysler Corporation Vehicle radio anti-theft arrangement and method
US20060036356A1 (en) * 2004-08-12 2006-02-16 Vladimir Rasin System and method of vehicle policy control
US7016986B2 (en) * 2001-07-17 2006-03-21 Daimlerchrysler Ag Configuration of an information system for a transport vehicle subsystem that transmits component input/output rules for the information system
US7120507B2 (en) * 2002-07-12 2006-10-10 Fujitsu Ten Limited Control apparatus and control system
US20060235579A1 (en) * 2003-10-10 2006-10-19 General Motors Corporation Method and system for remotely inventorying electronic modules installed in a vehicle
US7131005B2 (en) * 2002-06-28 2006-10-31 Motorola, Inc. Method and system for component authentication of a vehicle

Family Cites Families (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
DE19807066A1 (en) 1998-02-20 1999-09-09 Messerschmid Security device for the global protection of objects with electronic components
CN1259703A (en) * 1999-10-25 2000-07-12 靳宏湘 Vehicle computer network management method and its terminal processor
JP2002321569A (en) 2001-04-26 2002-11-05 Matsushita Electric Ind Co Ltd On-vehicle electronic equipment
JP2003137071A (en) 2001-11-06 2003-05-14 Matsushita Electric Ind Co Ltd Anti-theft device
JP2003324458A (en) 2002-04-26 2003-11-14 Sumitomo Electric Ind Ltd Gateway device

Patent Citations (20)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5796329A (en) * 1995-07-20 1998-08-18 Siemens Aktiengesellschaft Immobilizer and method for initializing the immobilizer
US6377860B1 (en) * 1998-07-31 2002-04-23 Sun Microsystems, Inc. Networked vehicle implementing plug and play with javabeans
US20010002814A1 (en) * 1999-12-07 2001-06-07 Takeshi Suganuma Control information rewriting system
US20010049569A1 (en) * 2000-03-29 2001-12-06 Helmar-Steffen Gehrke Device for exchanging data with a motor vehicle
US20040015272A1 (en) * 2000-05-16 2004-01-22 Vasco Vollmer Method for integrating a device into a vehicle communications network
US20020038222A1 (en) * 2000-09-19 2002-03-28 Seiko Epson Corporation Optional part for apparatus, apparatus having optional part, access device, method for distributing optical part and ink cartridge
US20060050103A1 (en) * 2000-09-19 2006-03-09 Seiko Epson Corporation Optional part for apparatus, apparatus having optional part, access device, method for distributing optional part and ink cartridge
US20020087240A1 (en) * 2000-11-21 2002-07-04 Mathias Raithel Method for documentation of data for a vehicle
US7016986B2 (en) * 2001-07-17 2006-03-21 Daimlerchrysler Ag Configuration of an information system for a transport vehicle subsystem that transmits component input/output rules for the information system
US20030080619A1 (en) * 2001-10-29 2003-05-01 Visteon Global Technologies, Inc. Communication network for an automobile
US20030120395A1 (en) * 2001-12-21 2003-06-26 General Motors Corporation Method and system for managing vehicle control modules through telematics
US20040002799A1 (en) * 2002-06-28 2004-01-01 Dabbish Ezzat A. Method and system for maintaining a configuration history of a vehicle
US7131005B2 (en) * 2002-06-28 2006-10-31 Motorola, Inc. Method and system for component authentication of a vehicle
US20040044454A1 (en) * 2002-07-12 2004-03-04 General Motors Corporation Method and system for implementing vehicle personalization
US7120507B2 (en) * 2002-07-12 2006-10-10 Fujitsu Ten Limited Control apparatus and control system
US6927676B2 (en) * 2003-08-01 2005-08-09 Daimlerchrysler Corporation Vehicle radio anti-theft arrangement and method
US20050075759A1 (en) * 2003-09-18 2005-04-07 Denso Corporation Information processing system
US20060235579A1 (en) * 2003-10-10 2006-10-19 General Motors Corporation Method and system for remotely inventorying electronic modules installed in a vehicle
US20050090941A1 (en) * 2003-10-22 2005-04-28 General Motors Corporation Telematics based programming gateway
US20060036356A1 (en) * 2004-08-12 2006-02-16 Vladimir Rasin System and method of vehicle policy control

Cited By (21)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9334820B2 (en) 2006-07-11 2016-05-10 Komatsu Ltd. Working machine component monitoring system
US8854183B2 (en) 2006-07-11 2014-10-07 Komatsu Ltd. System for monitoring component of operating machine
US8830031B2 (en) 2006-07-11 2014-09-09 Komatsu Ltd. System for monitoring component of operating machine
US20080114508A1 (en) * 2006-11-04 2008-05-15 Dr. Ing. H.C. F. Porsche Aktiengesellschaft Method for Repairing Vehicle Electronics of a Motor Vehicle
US20090288175A1 (en) * 2008-05-14 2009-11-19 Sun chun-yi Electronic anti-theft system for vehicle components
US20110112718A1 (en) * 2008-05-23 2011-05-12 Bayerische Motoren Werke Aktiengesellschaft On-board network system of a motor vehicle and process for operating the on-board network system
US20110107120A1 (en) * 2009-11-02 2011-05-05 Sony Corporation Information processing apparatus, power supply control method, program and power supply control system
US8527784B2 (en) 2009-11-02 2013-09-03 Sony Corporation Information processing apparatus, power supply control method, program and power supply control system to define processing depending on types of power supply apparatus connected
US8547204B2 (en) * 2009-11-02 2013-10-01 Sony Corporation Information processing apparatus, power-supply control method, program, and power supply control system
US8745422B2 (en) 2009-11-02 2014-06-03 Sony Corporation Power supply control method, program and power supply control system capable of exercising power supply control based on the type of a connected power supply apparatus
CN102054144A (en) * 2009-11-02 2011-05-11 索尼公司 Information processing apparatus, power-supply control method, program, and power-supply control system
US20110102136A1 (en) * 2009-11-02 2011-05-05 Sony Corporation Information processing apparatus, power-supply control method, program, and power-supply control system
WO2012171759A1 (en) * 2011-06-14 2012-12-20 Siemens Aktiengesellschaft Method and verifying control unit for verifying vehicle components
US20150095997A1 (en) * 2012-05-29 2015-04-02 Toyota Jidosha Kabushiki Kaisha Authentication system and authentication method
US9577997B2 (en) * 2012-05-29 2017-02-21 Toyota Jidosha Kabushiki Kaisha Authentication system and authentication method
US10541875B2 (en) 2013-12-11 2020-01-21 Komatsu Ltd. Work machine, management system and management method
US9215228B1 (en) 2014-06-17 2015-12-15 Cisco Technology, Inc. Authentication of devices having unequal capabilities
US9380044B2 (en) 2014-09-10 2016-06-28 Cisco Technology, Inc. Supporting differentiated secure communications among heterogeneous electronic devices
WO2018111842A1 (en) * 2016-12-15 2018-06-21 Caterpillar Inc. Lifecycle tracking for machine components
US11444939B2 (en) 2017-07-10 2022-09-13 Sumitomo Electric Industries, Ltd. Authentication control device, authentication control method, and authentication control program
US10915069B2 (en) 2018-07-26 2021-02-09 Caterpillar Inc. Monitoring system for monitoring usage of uniquely identifiable machine components

Also Published As

Publication number Publication date
CN1690992A (en) 2005-11-02
DE102005000999A1 (en) 2005-08-04
JP2005196568A (en) 2005-07-21
KR20050073405A (en) 2005-07-13
US7415332B2 (en) 2008-08-19
US20050192716A1 (en) 2005-09-01
CN100399309C (en) 2008-07-02

Similar Documents

Publication Publication Date Title
US7415332B2 (en) Method and system for vehicle component management, method and system for vehicle component management data update, and vehicle component management center
US7164213B2 (en) Theft prevention system for motor vehicles
US20080027602A1 (en) System and method for deterring theft of vehicles and other products having integral computer means
US9316196B2 (en) Vehicle controller
JP4859493B2 (en) Authentication processing system, authentication processing method, authentication apparatus, and authentication method
CN107251105B (en) Motor vehicle security and motor vehicle safety system
US6847864B2 (en) Vehicular communications system initializing abnormal control unit
US20010002814A1 (en) Control information rewriting system
JPH08150903A (en) Burglary preventing device of vehicle
US9367048B2 (en) Vehicle controller
CN111762126A (en) Vehicle intelligent key management method and vehicle control unit
JP2008001133A (en) Security controller for vehicle
JP2008084120A (en) Electronic control device
JP2017007650A (en) Vehicular anti-theft device
JP2007253730A (en) Vehicular security device and vehicular security system
CN111051159A (en) Vehicle control system
JP6274849B2 (en) Vehicle control system
WO2004007254A1 (en) Motor-vehicle electronic control device with theft-prevention function, and method of controlling motor vehicle engine
US20040204796A1 (en) Method and apparatus for validating vehicle operators and management of validation information
JP2008050885A (en) Vehicle authentication device
KR100706448B1 (en) Engine ECU starting control method for anti-theft of immobilizer system vehicle
JP4534731B2 (en) Electronic control device and identification code generation method thereof
JP2003196755A (en) System for monitoring theft of on-vehicle component and on-vehicle component
KR101315745B1 (en) Key Registry Method of Immobilizer System
JP2006021598A (en) Antitheft system for vehicle

Legal Events

Date Code Title Description
STCB Information on status: application discontinuation

Free format text: ABANDONED -- FAILURE TO RESPOND TO AN OFFICE ACTION