Patent classifications
H04L2209/84
COMMUNICATION DEVICE AND METHOD FOR CRYPTOGRAPHICALLY SECURING COMMUNICATION
A communication device for a vehicle has a communication unit set up to establish a communication link between the vehicle and an external vehicle server and to exchange data in a cryptographically secured manner between the vehicle and the external vehicle server. The communication unit is further set up to be operated in a first or second mode. The modes differ in the type of cryptographic securing of the data. The communication unit has a secure hardware memory in which a binary value corresponding to the respective mode is stored.
Issuing offline PKI certificates in distributed V2X network
Method and system for issuing public key infrastructure (PKI) certificates in a peer-to-peer wireless communication network, comprising generating, at a first certificate authority (CA) node in the peer-to-peer communication network, a PKI certificate based on public key information received from an applicant node in the peer-to-peer wireless communication network; and transmitting the PKI certificate generated by the first CA node to the applicant node using the peer-to-peer wireless communication network.
DISTRIBUTION OF DIGITAL CONTENT TO VEHICLES
The technology disclosed herein enables a processor to receive, at a distribution unit, a first content request from a distribution electronic control unit (ECU) associated with a vehicle, wherein the first content request reflects one or more filtering criteria, determine whether a content item that satisfies the filtering criteria is stored on a storage device of the distribution unit, responsive to determining that the content item that satisfies the filtering criteria is not stored on the storage device of the distribution unit: send, to a managed content delivery service, a second content request, wherein the second content request includes the filtering criteria, and receive, from the managed content delivery service, the content item that satisfies the filtering criteria, and send the content item that satisfies the filtering criteria to the distribution ECU associated with the vehicle.
DISTRIBUTED METHOD AND SYSTEM FOR VEHICLE IDENTIFICATION TRACKING
A fleet management system will receive, from each vehicle of a fleet of vehicles, a vehicle identification number (VIN). The system also will receive data elements that comprise: (a) vehicle operational parameters gathered during a run of the vehicle; (b) a hardware identification code that identifies a hardware component of the vehicle; and/or (c) a software identification code that identifies an installed software component in the vehicle. The processor will generate a data block that comprises the VIN and the one or more data elements. The processor will then save the data block to a shared digital ledger that includes VINs and data elements for a plurality of the vehicles in the fleet.
UWB system
Disclosed is an ultra-wideband (UWB) system and, more particularly, a UWB system using UWB ranging factor definition. The UWB system using the UWB ranging factor definition includes a memory in which a UWB ranging factor definition program is embedded and a processor which executes the program, wherein the program predefines UWB ranging factors to define a scrambled timestamp sequence (STS) index, an encryption key, and a nonce.
Secure Communication in a Computing System
Securely communicating traffic between control units interconnected by a network. An electronic control unit (ECU) receives a signed manifest identifying public keys for a group of ECUs authorized to communicate over the network. The ECU performs an authentication exchange with the ECUs in the group. The authentication exchange uses public keys identified in the manifest. Based on the authentication exchange, the ECU distributes a group key to authenticated ones of the ECUs that communicate messages authenticated using the group key.
CRYPTOGRAPHICALLY SECURE MECHANISM FOR REMOTELY CONTROLLING AN AUTONOMOUS VEHICLE
Disclosed are techniques for remotely controlling autonomous vehicles. In one embodiment, a method is disclosed comprising receiving a message from a first autonomous vehicle, the message including a signed body portion and a triple including components selected from the group consisting of a public identifier of the first autonomous vehicle, a public key of the first autonomous vehicle, and a certificate of the first autonomous vehicle; authenticating the message by verifying the certificate of the first autonomous vehicle; logging the message into a blockchain storage structure, the blockchain storage structure storing a plurality of blocks, each blocking including the signed body portion; and executing one or more orders included within the signed body portion.
DATA VERIFICATION METHOD AND APPARATUS
Example data verification methods and apparatus are described. One example method is applied to a first device in a vehicle, where the vehicle includes the first device and a second device. The first device receives a first message from the second device, where the first message includes first verification information, the first verification information is used to perform verification on first data, and the first data is configuration information of the second device that is stored in the second device. The first device performs verification on the first data based on configuration information of the second device that is stored in the first device and the first verification information.
Authentication Method, Medium, and Electronic Device
An authentication method and an electronic device. The method includes sending, by a first device, in response to a first device determining that a distance between the first device and a second device reaches a first distance, a first request to the second device, so that the second device determines whether wireless communication between the first and second device is relayed before the first device performs a service, determining, in response to the distance between the first and second device reaching a second distance, whether success ciphertext sent by the second device is received, wherein the success ciphertext is sent in response to the second device determining that wireless communication between the first and second device is not relayed and the second distance being less than the first distance, and performing the service in response to reception and successful verification of the success ciphertext.
PRIVACY-PRESERVING DELIVERY OF ACTIVATION CODES FOR PSEUDONYM CERTIFICATES
In a vehicle-to-everything (V2X) technology environment, systems and methods are provided for extending the distribution of activation codes (ACs) in an Activation Codes for Pseudonym Certificates (ACPC) system, in a privacy-preserving manner, to a unicast mode of communication. In this unicast ACPC (uACPC), in some embodiments, the ACs are distributed by the back-end system via a unicast channel upon the receipt of the vehicle's direct request for its respective ACs. In some embodiments, uACPC can leverage edge computing architecture for low latency delivery of certificate revocation lists (CRLs) and higher availability for the distribution of ACs.