H04L2209/84

Authentication system and authentication method

An authentication system includes a first controller that performs wireless communication with a mobile terminal and a first authentication unit that executes authentication of the mobile terminal including ID authentication and code authentication through the wireless communication performed between the first controller and the mobile terminal. The first authentication unit executes the code authentication by determining whether a terminal-side calculation result obtained by the mobile terminal matches a controller-side calculation result obtained by the first controller. The authentication system further includes a second controller that communicates with the mobile terminal and a second authentication unit that applies encryption communication using a portion of the terminal-side calculation result and a portion of the controller-side calculation result to communication performed between the second controller and the mobile terminal and authenticates the encryption communication.

UNAUTHORIZED DEVICE RESOURCE DRAIN PREVENTION

Detection and prevention of resource drain from unauthorized wireless device connections is provided. Responsive to receiving of a connection request from a connecting device, a pre-authentication message is sent to the connecting device, the pre-authentication message including a challenge value. A vehicle hash result is computed using a hash function taking the challenge value and the unique identifier of the vehicle as inputs. A device hash result is received from the connecting device. Responsive to a match of the vehicle hash result and the device hash result, additional hardware of the vehicle is activated to perform a secondary authentication of the connecting device. Responsive to a mismatch, authentication of the connecting device is rejected without activation of the additional hardware, thereby avoiding key-off load from the additional hardware in instances where pre-authentication of the connecting device fails.

SYSTEM AND METHOD FOR THE COOPERATIVE OPERATION OF AERIAL AND TERRESTRIAL VEHICLES
20220345320 · 2022-10-27 ·

A system and a method of using a centralized hub that controls and authenticates which aerial and/or terrestrial vehicles are on a local vehicle operations travelway. Communications networks are established that can handle one-off decisions for local networks, regarding the vehicles. This centralized hub may be implemented for each location, and federated with other centralized hubs.

IDENTIFYING SOFTWARE INTERDEPENDENCIES USING LINE-OF-CODE BEHAVIOR AND RELATION MODELS
20230084961 · 2023-03-16 · ·

Disclosed herein are techniques for identifying software interdependencies based on functional line-of-code behavior and relation models. Techniques include identifying a first portion of executable code associated with a first controller; accessing a functional line-of-code behavior and relation model representing functionality of the first portion of executable code and a second portion of executable code; determining, based on the functional line-of-code behavior and relation model, that the second portion of executable code is interdependent with the first portion of executable code; and generating, based on the determined interdependency, a report identifying the interdependent first portion of executable code and second portion of executable code.

SYSTEMS AND METHODS FOR MAINTAINING TRANSFERABILITY OF TITLE VIA BLOCKCHAIN

The present embodiments relate to systems and methods for using a blockchain to record information related to the lifecycle of a vehicle associated with a Vehicle Identification Number (VIN), or other vehicle identifier. For example, the VIN lifecycle process may be used to ensure the transferability of title, including when information relevant to transferability is not easily determinable, such as after a collision occurs. The systems and methods may include the reception of a mileage report corresponding to a vehicle and updating a blockchain to associate the vehicle with mileage information. The systems and methods described herein may allow for using a blockchain which gives the option for private information, and permissioned participants in the blockchain. In particular, the systems and methods allow for a distributed consensus amongst businesses, consumers, and authorities, as to the validity of information and transactions stored on the blockchain.

ENHANCED SECURE ONBOARD COMMUNICATION FOR CAN

According to certain general aspects, the present embodiments relate generally to securing communication between ECUs. Example implementations can include a method of securely transmitting Controller Area Network (CAN) protocol frames via a CAN controller.

Method For Protection From Cyber Attacks To A Vehicle Based Upon Time Analysis, And Corresponding Device

A method for protection from cyber attacks in a CAN (Controller Area Network), of a vehicle including the steps of selecting periodic messages having a transmission periodicity, grouping the periodic messages, and performing an analysis of messages of the nodes that exchange the received periodic messages, which includes obtaining times of arrival at the respective nodes of a set of periodic messages that have the same message identifier, computing average-offset values over successive subsets, of a given number of messages, accumulating the average-offset values for each identifier to obtain accumulated-offset values, identifying linear parameters by computing an angular coefficient, of a regression, and an intercept, or identification error, computing a correlation coefficient of the average offset of pairs of messages identified as coming from the same node, determining whether the correlation coefficient is higher than a first given threshold, determining whether the angular coefficient between two consecutive messages with the same identifier is higher than a second given threshold, determining whether the intercept between two consecutive messages is higher than a third given threshold, and supplying the results of these determinations to a message-classification operation.

Using a Distributed Ledger to Determine Fault in Subrogation

Systems and methods are disclosed with respect to using a blockchain for managing the subrogation claim process related to a vehicle accident, in particular, determining fault as part of the subrogation process. An exemplary embodiment may include receiving an electronic notification of a vehicle collision; receiving sensor data (such as telematics, image, audio, vehicle operational, or other sensor data) related to the vehicle collision; determining a percentage of fault of the vehicle collision for one or more vehicles, vehicle systems, and/or drivers based upon, at least in part, analysis of the sensor data collected; and creating a blockchain for the vehicle collision with one or more links to the sensor image data and an indication of the percentage of fault(s) determined to facilitate blockchain-based claim handling.

System and method for detecting active relay station attacks between two multimedia communication platforms

A method for detecting relay attacks between two communication platforms, the method including: receiving, at a first communication platform, a first signal sent via a first communication channel from a second communication platform, the first signal including information about a challenge; receiving, at the first communication platform, a second signal sent via a second communication channel from the second communication platform, the second signal being a start clock; receiving, at the first communication platform, a third signal sent via the second communication channel from the second communication platform, the third signal including the challenge; outputting, from the first communication platform, a response to the challenge via the first communication channel to the second communication platform; and determining, at the second communication platform, whether a relay attack has occurred based on a time elapsed from when the start clock began to when the response is received at the second communication platform.

Input information management system

An input information management system for a vehicle that can be used by using each of a plurality of electronic keys, the system managing input information that is input by a user, where the system includes a key information acquisition unit that acquires and stores key information of an electronic key, when an operation is performed on the vehicle using the electronic key, and an input information erasure unit that erases the input information that is stored in a storage device, where, when the key information is acquired by the key information acquisition unit, the input information erasure unit compares current key information that is acquired with last key information that is last stored by the key information acquisition unit before acquisition of the current key information, and erases the input information that is stored in the storage device on a basis of a result of the comparison.