H04L2209/84

MANAGING COMMUNICATIONS BETWEEN A VEHICLE AND A USER DEVICE

Systems and methods are provided to communicate, by a server, with a vehicle over a second communication path, where the vehicle is configured to communicate with a user device over a first communication path. The server may associate a user device with an authenticated user profile that is associated with the vehicle. The server may identify a public-private key pair associated with the user device and a public-private key pair associated with the vehicle. Processing circuitry may generate a shared key based on the public-private key pair associated with the user device and the public-private key pair associated with the vehicle, and the processing circuitry may establish a communication channel between the user device and the vehicle over the first communication path using the shared key.

SYSTEM AND METHOD FOR GENERATING RANDOM NUMBERS WITHIN A VEHICLE CONTROLLER
20230072454 · 2023-03-09 ·

A system and method is disclosed for generating a pseudo-random number to prevent unauthorized access to an application-layer communication protocol (e.g., Unified Diagnostic Service protocol) within a vehicle. A first controller within the vehicle may be selected as a security server (e.g., SecurityAccess server). A second controller may be selected that may be in operable communication with the first controller over a shared bus network (e.g., Communication Area Network). A response time-based, voltage-based, or random walk-based algorithm may be employed to generate a pseudo-random number. It is contemplated the pseudo-random number may be generated as a challenge when access is being requested through the application-layer communication protocol.

BROKER-BASED BUS PROTOCOL AND MULTI-CLIENT ARCHITECTURE

A system and method for an eSync bus protocol is provided. The eSync bus protocol uses a broker to route communications between electronic devices within an electronic environment, such as within a vehicle or the like. The electronic devices may first register with the broker, and thereafter send messages to the broker for routing to other registered electronic devices. In this way, the broker may act as an intermediary to route communications using the eSync bus protocol. A multi-client architecture is also provided in which multiple domains may be defined by the functions performed by electronic devices within a respective domain.

Maintenance plant management method, system and data management server
11475448 · 2022-10-18 · ·

The present application discloses a maintenance plant management method, maintenance plant management system and data management server, this method comprises: receiving, via a data management server, a transaction request of using a maintenance plant from a first user and calling a usage smart contract to grant a permission of usage of the maintenance plant to the first user according to the transaction request; calling the usage smart contract to send a transaction payment request to the first user according to transaction information when the first user finishes using the maintenance plant; performing a sharing according to the transaction sharing rule via the data management server when the payment transaction is finished by the first user; and receiving the transaction information submitted by the data management server and registering the transaction information in a block chain via the block chain node device.

SYSTEMS AND METHODS FOR AI/MACHINE LEARNING-BASED BLOCKCHAIN VALIDATION AND REMEDIATION

A system described herein may utilize artificial intelligence/machine learning (“AI/ML”) or other suitable techniques to automatically identify blocks added to or proposed to be added to a blockchain, with conflicting and/or otherwise incompatible information, and to automatically remediate the blockchain based on the identified conflict and/or incompatibility. The model may associate different types of conflicts and/or incompatibilities with different types of remedial measures. The remedial measures may include the rejection of a proposed block, recording a new block that takes precedence or priority over a previously recorded block, or other suitable remedial measures.

Recognizing assigned passengers for autonomous vehicles

Aspects of the disclosure provide systems and methods for recognizing an assigned passenger. For instance, dispatching instructions to pick up a passenger at a pickup location are received. The instructions include authentication information for authenticating a client computing device associated with the passenger. A vehicle is maneuvered in an autonomous driving mode towards the pickup location. The client device is then authenticated. After authentication, a set of pedestrians within a predetermined distance of the vehicle are identified from sensor information generated by a sensor of the vehicle and location information is received over a period of time from the client device. The received location information is used to estimate a velocity of the passenger. This estimated velocity is used to identify a subset of set of pedestrians that is likely to be the passenger. The vehicle is stopped to allow the passenger to enter the vehicle based on the subset.

Vehicle electronic device, electronic device, information receiving and sending methods thereof, server and communication system

A vehicle electronic device, an electronic device and information receiving and sending methods thereof, a server and a communication system. The vehicle electronic device includes: a first processing component and a first storage component connected with the first processing component. First password information and vehicle information are stored in the first storage component. The first processing component Is configured to generate a second dynamic password according to the first time for receiving a connection request and the first password information and the vehicle information stored in the first storage component when receiving the connection request including a first dynamic password sent by an external electronic device, and to receive information sent by the external electronic device when determining that the second dynamic password is matched with the first dynamic password.

End-to-end communication security

In one implementation, a method for providing end-to-end communication security for a controller area network (CANbus) in an automotive vehicle across which a plurality of electronic control units (ECU) communicate is described. Such an automotive vehicle can include, for example, a car or truck with multiple different ECUs that are each configured to control various aspects of the vehicle's operation, such as an infotainment system, a navigation system, various engine control systems, and/or others.

Wireless ECU configuration updating

Systems, apparatuses, and methods for wirelessly updating electronic control unit configuration can include determining operation parameters to be changed of an electronic control unit of an equipment, and generating a write package including the operating parameters to be changed. The systems, apparatuses, and methods include transmitting the write package to the equipment. The write package causes the electronic control unit to change the operation parameters upon verifying that the operation parameters are applicable to the equipment based on values of the parameters. In response to determining that the operation parameters are not applicable to the equipment, the write package can be discarded.

Systems and methods for efficient key management in a vehicular intranet

Embodiments described herein provide a tree-based key management protocol with enhanced computational and bandwidth efficiency. A tree structure including a plurality of nodes is formulated according to modules in a vehicle. A group key and a blinded key are computed for a leaf node from the plurality of nodes based at least in part on a multiplication operation defined in an ecliptic curve group. Or a group key and a blinded key are recursively computed for a non-leaf node based at least in part on a key derivation function and the multiplication operation involving a group key and a blinded key corresponding to nodes that is one level down to the non-leaf node.