H04L2209/84

Hydrogen fueling station communication

Fueling verification systems and methods for corroboration of vehicle fueling are described herein. The systems and methods provide for verifiable transmission of data collected from a remote source to assure data integrity and maintain proper fuel transmission as part of vehicle fueling. The systems and methods can include collecting a first fuel measure for a fueling process from a delivery source. A second fuel measure can be recorded into a blockchain. The second fuel measure for the fueling process can be received from a recipient source. Then, the first fuel measure and the second fuel measure can be correlated to determine a fueling offset. Then, the delivery source and/or the recipient source can be compensated based on the fueling offset.

Vehicle and method of controlling the same

A vehicle includes: at least one memory configured to store at least one default Instruction Structure Key (ISK), a generated ISK, and a pin code of the vehicle; and at least one processor. The at least one default ISK may include a first default ISK and a second default ISK. The processor may generate a random number using the first default ISK, receive the second default ISK encrypted with the generated ISK generated based on the pin code, and determine the generated ISK as an encryption key for encryption communication of the vehicle when the generated random number and the random number corresponding to the second default ISK are the same.

Systems and methods for vehicle configuration verification with failsafe code

A computer system for verifying vehicle software configuration may be provided. The computer system may include a processor and a non-transitory, tangible, computer-readable storage medium having instructions stored thereon that, in response to execution by the processor, cause the processor to: (1) transmit, to a vehicle computing system, an authentication request including a hash algorithm specification; (2) receive, from the vehicle computing system, a current configuration hash value and a vehicle identifier; (3) retrieve a trusted data block from a memory based upon the vehicle identifier, the trusted data block including a stored configuration hash value and a smart contract code segment; (4) execute the smart contract code segment, the smart contract code segment including a failsafe code segment; and/or (5) transmit the authentication response to the vehicle computing system, and cause the vehicle computing system to execute the failsafe code segment.

Method for protected communication between a vehicle and an external server, device for performing key derivation in the method, and vehicle
11477639 · 2022-10-18 · ·

A method for protected communication is provided. The method comprises defining master keys for different service domains within the scope of influence of a vehicle manufacturer generating a master key reference for the vehicle within the range of influence of the vehicle manufacturer, securely introducing one or more of the cryptographic keys derived from at least one of the defined master keys and the associated master key reference into the vehicle, and transmitting to an external server a message signed with one of the derived cryptographic keys, which is additionally provided with the master key reference and the current status of the vehicle. The method further comprises deriving the at least one cryptographic key in the external server from the master key identified by the master key reference depending on the key status of the vehicle, and checking the authenticity of the signed message with the derived cryptographic key.

Using a blockchain to determine trustworthiness of messages between vehicles over a telecommunications network
11601787 · 2023-03-07 · ·

Systems and methods are described herein for configuring vehicles and infrastructure (e.g., buildings, smart homes, traffic devices, utilities and associated systems, emergency response systems, and so on) to include blockchain nodes, so a smart city or area of the various devices can be supported by a blockchain network, with some or all devices and systems provisioned with nodes acting as distributed nodes for the blockchain network.

Vehicle operation device, vehicle operation method, and non-transitory storage medium storing vehicle operation program
11597349 · 2023-03-07 · ·

A vehicle operation device includes memory and a processor. The processor is configured to store tokens received from a server in the memory to be used for authentication to a vehicle. When an operation of the vehicle is performed in a state in which communication with the server is possible, a token is used to conduct authentication to the vehicle. When a predetermined operation of the vehicle is performed in a state in which communication with the server is interrupted, authentication to the vehicle is conducted without using a token.

Automated configuration of provision of products and services
11636410 · 2023-04-25 · ·

Technologies are provided for automated configuration of delivery of a product or service. The technologies include a vehicular network that can detect job requests for the delivery of a product or service, where the job requests are based on hashtags. Each vehicle in the vehicular network can include an apparatus that can receive request data from a computing system remotely located relative to the vehicle. A first portion of the request data defines a job request which can be detected by the apparatus by validating the request data. The apparatus can then update a ledger record and also can cause other vehicle in the vehicular network to update other respective ledger records. In addition, the apparatus can send a response to the job request to the computing system. The response permits implementing, or managing the implementation, of a transaction corresponding to the job request.

Sensing and controlling states of locking mechanisms

An affixable device can include a locking mechanism, a force-limiting mechanism, and a sensing mechanism. The locking mechanism can include an engagement component configured to disable the locking mechanism. The force-limiting mechanism can be configured to limit a locking force of the locking mechanism. The sensing mechanism can be coupled to the engagement component, and can be configured to determine that the force-limiting mechanism has limited the locking force of the locking mechanism. In response to determining the force-limiting mechanism limiting the locking force, the sensing mechanism can cause the engagement component to disable the locking mechanism.

ARTIFICIAL INTELLIGENCE-BASED SYSTEMS AND METHODS FOR VEHICLE OPERATION
20230118340 · 2023-04-20 ·

A method includes receiving, at a server, first sensor data from a first vehicle. The method includes receiving, at the server, second sensor data from a second vehicle. The second sensor data includes condition data indicating a road condition. The method includes aggregating, at the server, a plurality of sensor readings to generate aggregated sensor data. The plurality of sensor readings include the first sensor data and the second sensor data. The method further includes transmitting a first message based on the aggregated sensor data to the first vehicle, wherein the first message causes the first vehicle to perform a first action, the first action comprising avoiding the road condition, displaying an indicator corresponding to the engine problem, displaying a booked route, or a combination thereof.

Vehicle Control Interface and Vehicle Including the Same, Autonomous Driving System and Vehicle Including the Same, and Method of Controlling Vehicle
20230119228 · 2023-04-20 ·

A VP includes a sleep mode in which a VCIB is not on and a wake mode in which the VCIB is on by power feed from an auxiliary battery provided in the VP. The VCIB includes a processor and a memory in which a program executable by the processor is stored. When the VP makes transition from the sleep mode to the wake mode in accordance with a power mode command from an ADS, the processor carries out device authentication of the ADS. When device authentication is successful, the processor starts communication with the ADS.