H04L2209/84

Method for user authentication of vehicle in autonomous driving system and apparatus thereof
11500974 · 2022-11-15 · ·

A method and an apparatus for user authentication of a vehicle in an autonomous driving system are disclosed. The method includes determining an authentication value indicating matching accuracy of authentication data entered for a passenger of the vehicle and authentication information of a caller of the vehicle, determining a driving setting of the vehicle based on the authentication value, driving on a pre-driving route according to the driving setting, performing decryption for encrypted data blocks related to the passenger received from an infra apparatus located on the pre-driving route, using a key value of the passenger, determining a destination of the vehicle based on whether the decryption for the encrypted data blocks succeeds or fails, and controlling the vehicle to drive to the destination. An autonomous vehicle of the present invention can be associated with artificial intelligence modules, drones (unmanned aerial vehicles (UAVs)), robots, augmented reality (AR) devices, virtual reality (VR) devices, devices related to 5G service, etc.

Electronic device and digital key provisioning method of electronic device

Disclosed are an electronic device and a method of performing digital key provisioning of an electronic device. The electronic device according to an embodiment includes a communication unit, a memory that stores programs and data for performing digital key provisioning, and a processor configured to, by executing the programs stored in the memory, perform device authentication on a target device by performing short-range communication with the target device, identify a digital key service access right of the target device through a server by obtaining user information, and control generation and storing of a digital key in response to a digital key generation request from the target device.

Removable sensor payload system for unmanned aerial vehicle performing media capture and property analysis
11501483 · 2022-11-15 · ·

An unmanned aerial vehicle (UAV) may couple to a sensor payload device that includes cameras, radar, lidar, and/or other sensors. The UAV, coupled to the sensor payload device, may fly within the airspace of and/or around a property and capture images and/or sensor measurements of the property. The images and sensor measurements may be certified so that they may be verified as unaltered by viewers. A 3D representation of the property may be generated, and defects in the property may be detected by comparing the 3D representation to media depicting property defects. A report identifying the defects may be generated.

Tracking of transport data

An example operation may include one or more of receiving, from at least one sensor associated with a transport, severity of damage information related to the transport, when the severity of damage exceeds a threshold, sending sensitive data on the transport to a storage apart from the transport, and deleting the information and the sensitive data from the transport.

DIGITAL CONTACT TRACING SECURITY AND PRIVACY WITH PROXIMITY-BASED ID EXCHANGE WITH A TIME-BASED DISTANCE-BOUNDING
20220360453 · 2022-11-10 ·

A method, system and devices for digital contact tracing security and privacy with proximity-based ID exchange with distance-bounding. The method is performed by a first wireless communication device and provides for exchanging IDs with a second wireless communication device. A rolling proximity identifier A associated with the first wireless communication device is sent to the second wireless communication device. A rolling proximity identifier B associated with the second wireless communication device is received from the second wireless communication device. A cryptographic challenge response authentication with time-based distance-bounding is performed based on a hash value determined from the rolling proximity identifiers in accordance with a hash function. The rolling proximity identifier of the second wireless communication device is only stored in memory in response to a successful cryptographic challenge response authentication.

Program generation method and electronic control unit for changing importance of functions based on detected operation state in a vehicle
11496506 · 2022-11-08 · ·

A program generation method includes extracting a control flow that represents a call/return relationship between functions as well as extracting the functions themselves from a program code, determining an importance of the extracted functions; and inserting an instruction into the program code, to properly perform the control flow based on the importance of the extracted functions. Overhead that occurs during an execution of the program execution is reducible by using control flow integrity (CFI) technique that does not depend on domains.

Systems and methods for encrypted vehicle data service exchanges

Encrypted vehicle data service exchanges are provided. In one embodiment, a vehicle communication manager comprises memory storing an embedded public key (EPK) for a data service; a processor executing a vehicle data service protocol to initiate a session with the data service. The protocol causes the processor to: transmit a session request to the data service and receive a session reply, the reply indicates if the manager is authorized for encrypted service, the processor validates authenticity of the session reply using the EPK; determine whether to enable message encryption, and transmit an initialization request indicating whether encryption is elected; generate a key derivation key (KDK) and transmit the KDK to the data service; receive an initiation response confirming whether message encryption is elected; and when elected generate at least one Message Encryption Key (MEK) from the KDK; encrypt data service uplink and downlink messages using the at least one MEK.

Electronic device for secure communications with an automobile

A mobile device securely communicates with an electronic device within an automobile. The mobile device transmits encrypted spatial state information and the electronic device provides commands to the automobile in response. Spatial state information may include location, motion, or the like. Commands to the automobile may include door unlock commands, remote start commands, horn honk commands, or the like.

SYSTEM AND ASSOCIATED METHODS FOR REMOTE CONTROL OF VESSELS
20230093869 · 2023-03-30 · ·

A machine and process for remotely controlling a vessel. The system may include a land-based computing system configured to communicate control signals via a communications system that communicates the control signals to the vessel and a controller network on the vessel configured to control at least certain functions of the vessel. The controller network may further be configured to receive the control signals from the land-based computing system. The controller may include a switch including an input port and multiple output ports. A remote control computing device may be configured to control the vessel via at least one other computing device. A one-way Ethernet cable may be communicatively coupled between one of the output ports of the switch and the remote control computing device. The control signals may be received by the switch being communicated to the remote control computing device via the one-way Ethernet cable.

REMOTE LOADING DOCK AUTHORIZATION SYSTEMS AND METHODS
20230095890 · 2023-03-30 ·

Systems and methods for monitoring components of a loading dock station that implement a remote monitoring and authorization system are disclosed. The systems and methods can provide information regarding the status of various components of the loading dock station to a remote monitoring and authorization control unit, where a supervisor or the like is capable of reviewing real time information regarding the status of the components and progress through and adherence to a workflow protocol. The systems and methods can also provide for authorization requests to be sent to the remote monitoring and authorization control unit, such as requests to override certain components of the docking station. The user at the remote monitoring and authorization control unit can then grant or deny requests based on status information and other data provided at the remote monitoring and authorization control unit.