Patent classifications
H04L2209/84
DATA ERASING DEVICE AND DATA ERASING METHOD
A data erasing device for use with a key system that allows at least one of an electronic key, a mobile terminal, and an authentication card to be used as a key of an operated subject. The electronic key functions as the key and is verified through wireless communication, the mobile terminal is used as the key by registering a digital key provided from an external device, and the authentication card is verified as the key through proximity wireless communication. A checking unit checks a result of a substitute authentication performed when at least one of the electronic key, the mobile terminal, and the authentication card that is used as the key is lost. The substitute authentication differs from an authentication performed on the lost key. An erasing unit erases key data of the lost key from a memory when the checking unit obtains a checking result indicating successful authentication.
Wireless baseband signal transmission with dynamic control logic to improve security robustness
Provided are embodiments for performing encryption and decryption in accordance with one or more embodiments. The embodiments include generating a random key address, obtaining a pre-stored key using the random key address, and re-arranging portions of the pre-stored key using the random key address. Embodiments also include selecting a dynamic logic operation based on the random key address, receiving data for encryption, and combining portions of the received data for encryption with the re-arranged portions of the pre-stored key using the dynamic logic operation to produce encrypted data. Embodiments include re-arranging portions of the encrypted data based on the random key address and combining the re-arranged portions of the encrypted data with the random key address into an encrypted data packet for transmission. Also provided are embodiments for a transmitter and receiver for performing the encryption and decryption.
Vehicle configurable transmitter for allowing cloud-based transfer of data between vehicles
A configurable transmitter is provided for a vehicle for transmitting signals to a device remote from the vehicle. The configurable transmitter includes an RF transmitter that receives an RF signal during a training mode to learn characteristics of the received RF signal, and to transmit an RF signal to the remote device in an operating mode where the transmitted RF signal includes the learned characteristics of the received RF signal; a local memory device for storing channel data representing the learned characteristics and for storing a unique identification code and a cloud encryption key; an interface that communicates with an Internet server; and a controller coupled to the local memory device and the interface, the controller retrieves the channel data from the local memory device, encrypts the channel data using the cloud encryption key and transfers the encrypted channel data for remote storage in the Internet server through the interface.
Systems and methods for onboard vehicle certificate distribution
Systems and methods for onboard vehicle certificate distribution are provided. A system can include a plurality of devices including a master device for authenticating processes and one or more requesting devices. The master device can include a master host security service configured to authenticate the one or more processes of the system. The master host security service can run a certificate authority to generate a root certificate and a private root key corresponding to the root certificate. A respective host security service can receive a request for a process manifest for a requesting process of a respective device from a respective orchestration service. The respective host security service can generate the process manifest for the requesting process and provide the process manifest to the requesting process. The requesting process can use the process manifest to communicate with the certificate authority to obtain an operational certificate based on the root certificate.
Secure activation, service mode access and usage control of IOT devices using bearer tokens
The disclosed technology teaches providing limited usage of a first device that includes local resources for verifying authenticity of a Macaroon access token with caveats (MATwC), a unique key and a local proximity interface. A second device used by the service technician receives the MATwC, establishes a connection with the first device over the local proximity interface using the MATwC, and sends a request to enter limited usage mode. The MATwC originated with an authentication server as a MAT, using the unique key of the first device and modified by appending caveats that narrowed authorization provided by the MAT with the limited usage mode, and applied a message authentication code chaining algorithm to sign a resulting the MATwC. The first device performs local authentication of the MATwC, evaluating the appended caveats and enters the limited usage mode consistent with the appended caveats, without requiring connected resources to authenticate the MATwC.
Electronic Control Unit, Apparatus for Performing Control Operations on an Electronic Control Unit, and Corresponding Methods and Computer Programs
An electronic control unit for a vehicle includes processing circuitry configured to determine first cryptographic information based on a private key of the electronic control unit and based on a public key of a second entity. The processing circuitry is further configured to obtain second cryptographic information via an interface, and to compare the first cryptographic information and the second cryptographic information. The processing circuitry is also configured to unlock a control access to the electronic control unit if the second cryptographic in formation is based on a private key of the second entity and based on a public key of the electronic control unit.
SECURE ECO-ROUTING WITH DATABASES UNDER HOMOMORPHIC ENCRYPTION
A method for generating energy-optimized travel routes for a motor vehicle includes one or more of the following: receiving an origin destination (OD) of the motor vehicle and an encrypted energy consumption database of the motor vehicle; generating N candidate routes for the OD; evaluating encrypted energy consumption over a route using an encrypted energy consumption database; applying at least one of homomorphic addition function or homomorphic multiplication function to the encrypted energy consumption data; and returning N candidate routes and their encrypted energy consumption to a client.
SECURE ENCLOSURE FOR A DIRECT CURRENT ELECTRIC VEHICLE SUPPLY EQUIPMENT
A direct current (DC) electric vehicle supply equipment (EVSE) that includes a secure enclosure. The secure enclosure encloses a set of one or more contactors to open and close to provide DC charge transfer with one or more electric vehicles; a conductor to electrically connect the contactors with DC input; a current sensor to measure current draw; a voltage sensing circuitry to measure voltage; and one or more circuits that receive current data from the current sensor and voltage data from the voltage sensing circuitry, the one or more circuits to perform one or more safety functions and one or more metering functions using the received current data and voltage data. The DC EVSE may also include, external to the secure enclosure, a controller that is coupled with the circuits to control the opening and closing of the set of contactors.
Out-of-band key splitting and key derivation
An example operation includes one or more of receiving, via a first communication channel between a sending device and a recipient device, a first partial encryption key from the receiving device, receiving, via a second communication channel between the sending device and the recipient device, a second partial encryption key from the receiving device, wherein the second communication channel comprises a different communication medium than the first communication channel, generating a transport key based on the first partial encryption key and the second partial encryption key received via the first and second channels, and encrypting data based on the generated transport key and transmitting the encrypted data to the receiving device.
Quantum authentication in wireless communication networks
A wireless communication network performs quantum authentication for a wireless User Equipment (UE). In the wireless communication network, network quantum circuitry generates and transfers qubits. UE quantum circuitry receives and processes the qubits and determines polarization states for the qubits. The UE quantum circuitry exchanges cryptography information with the network quantum circuitry and generates cryptography keys based on polarization states and cryptography information. The UE quantum circuitry transfers the cryptography keys to UE network circuitry. The network quantum circuitry exchanges the cryptography information with the UE quantum circuitry. The network quantum circuitry generates the cryptography keys based on the polarization states and the cryptography information and transfers the cryptography keys to network authentication circuitry. The UE network circuitry processes the cryptography keys to generate authentication data and wirelessly transfers to the network authentication circuitry. The network authentication circuitry receives the cryptography keys and the authentication data and authenticates the UE.