H04L2209/84

Data offload and time synchronization for ubiquitous visual computing witness

In one embodiment, a road side unit (RSU) establishes a data offload session with a vehicle in the vicinity of the RSU based on a session establishment request sent by the vehicle, and stores data received from the vehicle during the data offload session in its memory. The RSU generates storage record information (including identifying information for the RSU) for the stored data, and transmits the storage record information to the vehicle.

Data privacy system

A backend computer and methods of using the backend computer are described. The method may comprise: receiving, at a first backend computer, sensor data associated with a vehicle; determining a labeling of the sensor data, comprising: determining personal data and determining non-personal data that is separated from the personal data, wherein each of the personal and non-personal data comprise labeled data, wherein the personal data comprises information relating to at least one identified or identifiable natural person; and performing via the personal data and the non-personal data that is separated from the personal data, at the first backend computer, data processing associated with collecting sensor data associated with the vehicle.

Integrated circuit
11652070 · 2023-05-16 · ·

According to various embodiments, an integrated circuit is described comprising a plurality of subcircuits having different signal transfer reaction times, a control circuit configured to form two competing paths from the plurality of subcircuits in response to a control signal, an input circuit configured to supply an input signal to the two competing paths and an output circuit configured to generate an output value depending on which of the competing paths has transferred the input signal with shorter reaction time.

Information transmission system
11650783 · 2023-05-16 · ·

An information transmission system includes an encoder, a display, an imaging apparatus, and a decoder. The encoder is mounted on a first aircraft and is configured to encode information to create a secret code. The display is mounted on the first aircraft and is configured to display the secret code created by the encoder at a predetermined position on a surface of a body of the first aircraft. The imaging apparatus is mounted on a second aircraft and is configured to capture an image of the first aircraft. The decoder is mounted on the second aircraft and is configured to detect an image region including the secret code from the image captured by the imaging apparatus, decode the secret code by performing image processing on the detected image region, and read the information.

Secure unmanned aerial vehicle flight planning
11645920 · 2023-05-09 · ·

Techniques are described herein for securely managing and tracking UAV flight paths. The techniques include receiving a flight plan from an unmanned aerial vehicle (UAV). The UAV comprises a memory unit for storing a key associated with the UAV. The key enables the UAV to add one or more blocks on a blockchain distributed ledger, wherein the flight plan comprises one or more legs of a flight path. The techniques further include receiving, from the UAV, a block indicating that the UAV completed at least one leg of the flight path. The block can include a hash associated with the at least one leg of the flight path. The block is validated based at least on the hash associated with the at least one leg of the flight path and if the block is validated, a success notification is transmitted to the UAV to continue executing the flight plan.

Secure communication for a key replacement

The present disclosure includes apparatuses, methods, and systems for secure communication for a key replacement. An embodiment includes a processing resource, memory having a first operator's key, and a vehicular communication component. The vehicular communication component can be configured to provide, to a server, a public key generated along with a private key and decrypt, in response to receipt of a second operator's key (e.g., received in response to providing the public key to the server) encrypted using the public key, the second operator's key using the private key. The vehicular communication component can be configured to replace, in response to decrypting the encrypted second operator's key, the first operator's key with the second operator's key.

Systems and methods for verification and authentication of remote sensing imagery

A system for generating and authenticating remote sensing imagery includes a remote sensing platform. The remote sensing platform includes an imaging sensor and a hardware logic device that is directly coupled to the imaging sensor. The hardware logic device receives image data from the imaging sensor and generates a cryptographic signature based upon the image data. The hardware logic device outputs a signed image that includes the image data and the cryptographic signature. A computing device operated by a downstream user receives the signed image and can determine whether the image data has been modified from its original content based upon the cryptographic signature.

COMMUNICATION METHODS AND DEVICES IN INTELLIGENT TRANSPORT SYSTEMS
20230139446 · 2023-05-04 ·

According to some embodiments, there is provided a Collective Perception Message, CPM, characterizing a plurality of Vulnerable Road Users based on a plurality of received VAMs, thereby allowing an ITS station to efficiently aggregate VAM messages from VRUs and retransmit information about the VRUs to other ITS stations. Consequently, the security is improved as some ITS stations may not be able to detect or identify VRU stations by themselves but thanks to the CPM, these stations can still be informed of the VRUs. According to other aspects, congestion is avoided while maintaining safety vis-à-vis VRUs thanks to the use of a different transmission scheme when the VRU is already characterized in a CPM sent to the ITS stations. Also, a receiving station can evaluate whether the content of a CPM can be trusted or not. Safety is thus improved. This is achieved thanks to the CPM that references a certificate.

BEAMFORMED DISCOVERY
20230138008 · 2023-05-04 ·

There is provided an apparatus comprising one or more processors, and one or more memories storing instructions that, when executed by the one or more processors, cause the apparatus to perform: receiving, by a user equipment, directional probability information comprising a plurality of directions with probabilities, wherein a probability of a direction of the plurality of directions indicates how probable it is that another use equipment is in that direction; and determining beam widths and beamforming directions based on the probabilities.

INTEGRATED SECURE DEVICE MANAGER SYSTEMS AND METHODS FOR CYBER-PHYSICAL VEHICLES

Systems and methods are described for a cyber-physical vehicle management system generated by an Integrated Secure Device Manager (ISDM) Authority configured to manage licensing and approval of Cyber-Physical Vehicle (CPV)s, a public/private key pair and a unique ID for the Authority, create a self-signed Authority token signed by the private key, send the Authority token to a plurality of ISDM Node device configured to verify Module device authenticity and in communication with the Authority, store, by each Node, the Authority token, and mark, by each Node, the Authority token as trusted.