Patent classifications
H04L2209/84
METHOD AND DEVICE FOR SUPPORTING INSTALLATION OF CONTRACT CERTIFICATE FOR ELECTRIC VEHICLE
The present disclosure provides a method for supporting installation of a contract certificate by a charging service providing device. As an example, the present disclosure may comprise the steps of: generating a first contract certificate for a first electric vehicle (EV); and transmitting the first contract certificate to a first external charging service providing device (CSP) with which a roaming contract has been made, so as to enable the first contract certificate to be installed in the first EV via the first external CSP in a roaming situation.
METHOD OF SECURING AUTHENTICITY AND EVIDENTIARY STATUS OF VIDEO RECORDING, TERMINAL DEVICE, AND COMPUTER READABLE STORAGE MEDIUM APPLYING THE METHOD
A method of labeling video to provide authentication acquires an instruction to apply timestamp labeling. Each recorded video is labeled with a timestamp based on the instruction. The first mark information is generated based on a content of each recorded video as a hash value and is uploaded into a blockchain. Second mark information is generated based on a content of at least one video under investigation. By comparing the first mark information and the second mark information, a video under investigation is found to be undistorted and authentic when the first mark information is the same as the second mark information. The video under investigation is found to be non-authentic when the first mark information is different from the second mark information. A terminal device and a computer readable storage medium applying the method are also disclosed.
SYSTEM AND METHOD TO PRESERVE USER'S PRIVACY IN A VEHICLE MILES TRAVELED SYSTEM
A road usage charge system uses a proprietary blockchain to conduct transactions for road usage fees. While driving, a mobile device or equivalent tracks the vehicle location, speed, time of day, day of week, and any other parameter that may be used to modify a base road use fee are tracked and applied to conditional modifiers of the smart contract to create a new transaction block. As a result, the tedious reconciliation process normally associated with vehicular payments can be avoided.
METHOD OF SECURE AND AUTOMATED BOOTSTRAPPING ON KEYS AND CERTIFICATES FOR V2X ENVIRONMENT AND DEVICE THEREOF
A device for secure and automated enrollment-certificate bootstrapping on keys and certificates for a vehicle to everything (V2X) environment of a V2X end entity in a security credential management system (SCMS) for V2X communication, the device comprising: a processor; and a memory configured to store at least one instruction to be performed by the processor, the at least one instruction is configured to instruct the processor to perform steps of: by a secure bootstrapping service (SBS) agent, checking, for an SSB server, configuration information; by the SBS agent, making a request for bootstrapping data to the SBS server; and by the SBS agent, installing the bootstrapping data in the SBS server.
AUTOMOTIVE IMAGE SENSOR, IMAGE PROCESSING SYSTEM INCLUDING THE SAME AND OPERATING METHOD THEREOF
Provided is a method of operating an automotive image sensor, the method including performing a reset operation to set an initialization register corresponding to operation information of the automotive image sensor, receiving a device authentication request from an electronic control unit after performing the reset operation, performing an authentication operation with the electronic control unit based on the device authentication request, obtaining first image data while performing the authentication operation, transmitting the first image data to the electronic control unit while performing the authentication operation, obtaining second image data after the authentication operation is completed, generating a tag for the second image data, and transmitting the second image data and the tag to the electronic control unit.
ENABLING MACHINE OPERATION
A plurality of operator controls can, in an operation mode, operate a machine, and, in a validation mode, be disabled to operate the machine and selectable to provide inputs for a candidate key. A computing device can initialize the validation mode, including initializing the candidate key and, according to a number base, and a maximum storage length, of a stored key, an input multiplier; receive a plurality of inputs to the operator controls in the validation mode; determine respective numeric values of the inputs; add the candidate key to a product of the multiplier and the numeric value of a first input to update the candidate key; for each of one or more second inputs to the operator controls after the first input to the operator controls, determine whether the candidate key matches a stored key; and upon determining that the candidate key matches the stored key, output an authorization.
Securing outside-vehicle communication using IBC
A vehicle communication access framework and a method are provided. The vehicle communication access framework comprises: a first device residing in a vehicle, a first processing system operated by a trusted third party, a second processing system operated by an original equipment manufacturer (OEM) of the vehicle, and a third processing system operated by a third party provider; wherein communication accesses among the first device, second processing system and third processing system are based on Identity Based Cryptography (IBC) private keys generated by the first processing system to respective first device, second processing system and third processing system.
METHOD AND SYSTEM FOR CONTROLLING ACCESS TO SECURE DATA USING CUSTODIAL KEY DATA
Methods and systems for controlling access to secure data use a custodial TRNG disk. Source data is encrypted using first key data from a first TRNG disk to generate encrypted data which is stored at a first location by a first entity. A second TRNG disk has second key data which is stored at a second location by a second entity. A first TRNG disk copy and a second TRNG disk copy are made identical to the first TRNG disk and the second TRNG disk, respectively, and are stored at one or more locations by a custodial entity. The first key data and the second key data are encoded together, and then transmitted to one or more of the first or second entities. The first quantity of encrypted data is decryptable using the encoded first key data and the second key data.
Systems and methods for maintaining a distributed ledger of transactions pertaining to an autonomous vehicle
Methods and systems for maintaining a distributed ledger and/or blockchain of transactions and/or events pertaining to autonomous vehicles and/or smart contracts are provided. One or more processors may monitor one or more sensors associated with an autonomous vehicle. Based upon the outputs of the sensors, a change in condition of the autonomous vehicle may be detected. The condition may relate to operation, or an operational state of the vehicle and/or a condition associated with a smart contract. The processors may generate a transaction describing the detected change in the condition of the vehicle. The transaction may be transmitted to an enforcement server. As a result, an up-to-date ledger of autonomous vehicle and/or smart contract transactions and/or events may be maintained.
Digital Key With Monetary Value
The disclosure is directed to use of digital keys in providing access to secured locations, goods and resources as well as other assets. The access may be fee based with the disclosure further directed to including fee payment authorization into the access process. Electronic locks may be employed within modules to faciltiate the access. The digital keys may be accompanied with commands for the electronic locks and/or modules accomodating them to execute in the course of providing the access. The digital keys may be shared, limited to single or multiple use and may be lock agnostic. The commands may be sent from a smart mobile device and be digitally signed for subsequent attestation by the lock for authenticity verification. The digital keys may be generated and otherwise handled under one of a series of escalating security encryption methods typically used and reserved for financial transactions.