H04L2209/84

ID-BASED CONTROL UNIT-KEY FOB PAIRING
20230208620 · 2023-06-29 ·

A method for pairing a key fob with a control unit is provided. The key fob executes an ID authenticated key agreement protocol with a pairing device based on a key fob identification to authenticate one another and to generate a first encryption key. The pairing device encrypts a control unit identification using the first encryption key. The key fob receives the encrypted control unit identification transmitted from the pairing device. The key fob then executes an ID authenticated key agreement protocol with the control unit based on the control unit identification to authenticate one another and to generate a second encryption key. The key fob then receives an operational key transmitted from the control unit that is encrypted with the second encryption key.

SYSTEMS AND METHODS FOR VEHICLE CONFIGURATION VERIFICATION WITH FAILSAFE CODE

A computer system for verifying vehicle software configuration may be provided. The computer system may include a processor and a non-transitory, tangible, computer-readable storage medium having instructions stored thereon that, in response to execution by the processor, cause the processor to: (1) transmit, to a vehicle computing system, an authentication request including a hash algorithm specification; (2) receive, from the vehicle computing system, a current configuration hash value and a vehicle identifier; (3) retrieve a trusted data block from a memory based upon the vehicle identifier, the trusted data block including a stored configuration hash value and a smart contract code segment; (4) execute the smart contract code segment, the smart contract code segment including a failsafe code segment; and/or (5) transmit the authentication response to the vehicle computing system, and cause the vehicle computing system to execute the failsafe code segment.

METHOD AND APPARATUS FOR TRANSMITTING BUFFER STATUS REPORT FOR BI-DIRECTIONAL TRANSMISSION IN WIRELESS COMMUNICATION SYSTEM
20170374677 · 2017-12-28 · ·

A method and apparatus for transmitting a buffer status report for a bi-directional transmission in a wireless communication system is provided. A user equipment (UE) triggers a buffer status report for the bi-directional transmission, and transmits the buffer status report for the bi-directional transmission or a scheduling request for the bi-directional transmission to a network. The bi-direction transmission may correspond to vehicle-to-everything (V2X) communication.

SECURE AUTOMOTIVE SYSTEM

An Electronic Control Unit (ECU) provides security for an automotive system. The ECU is classified according to a Cybersecurity Assurance Level (CAL) and calculates a cryptographic value for one or more or all modules of the ECU. The calculated cryptographic value is compared with a stored cryptographic value. Based on the CAL classification of the ECU, either control to one or more modules of the ECU is provided or the ECU is shut down as follows: when the calculated cryptographic value matches the stored cryptographic value, control to the one or more or all modules of the ECU is provided; and, when the calculated cryptographic value does not match the stored cryptographic value, the ECU is shut down in one of a current boot cycle or a subsequent boot cycle.

Systems and methods for unmanned vehicle management

A property is identified about which to gather information. A vehicle is deployed to a location associated with the property. The vehicle gathers data at the location. A portion of the gathered data indicating a condition or event at the property is determined and encrypted. The portion of the gathered data is stored or sent to an authorized party.

REPORTING AND PROCESSING CONTROLLER SECURITY INFORMATION

In one implementation, a method for providing security on externally connected controllers includes receiving, at a reporting agent that is part of a security middleware layer operating on a controller, an indication that a process has been blocked; obtaining, by the reporting agent, trace information for the blocked process; determining, by the reporting agent, a code portion in an operating system of the controller that served as an exploit for the blocked process; obtaining, by the reporting agent, a copy of malware that was to be executed by the blocked process; generating, by the reporting agent, an alert for the blocked process that includes (i) the trace information, (ii) information identifying the code portion, and (iii) the copy of the malware; and providing, by the reporting agent, the alert to a network interface on the controller for immediate transmission to a backend computer system.

USING A BLOCKCHAIN TO DETERMINE TRUSTWORTHINESS OF MESSAGES BETWEEN VEHICLES OVER A TELECOMMUNICATIONS NETWORK
20230199451 · 2023-06-22 ·

Systems and methods are described herein for configuring vehicles and infrastructure (e.g., buildings, smart homes, traffic devices, utilities and associated systems, emergency response systems, and so on) to include blockchain nodes, so a smart city or area of the various devices can be supported by a blockchain network, with some or all devices and systems provisioned with nodes acting as distributed nodes for the blockchain network.

Systems and Methods for Onboard Vehicle Certificate Distribution

Systems and methods for onboard vehicle certificate distribution are provided. A system can include a plurality of devices including a master device for authenticating processes and one or more requesting devices. The master device can include a master host security service configured to authenticate the one or more processes of the system. The master host security service can run a certificate authority to generate a root certificate and a private root key corresponding to the root certificate. A respective host security service can receive a request for a process manifest for a requesting process of a respective device from a respective orchestration service. The respective host security service can generate the process manifest for the requesting process and provide the process manifest to the requesting process. The requesting process can use the process manifest to communicate with the certificate authority to obtain an operational certificate based on the root certificate.

IDENTIFYING SERVICES FOR TRANSPORTS

An example operation may include one or more of detecting, by a transport, a service provider within a range of the transport, determining, by the transport, if a transport occupant profile exists on a storage, querying, by the transport, the transport occupant profile on the storage based on the service provider, and responsive to the transport occupant profile containing data associated with the service provider, displaying service provider-related information when the transport is proximate to the service provider.

MOBILITY DEVICE

A powered balancing mobility device that can provide the user the ability to safely navigate expected environments of daily living including the ability to maneuver in confined spaces and to climb curbs, stairs, and other obstacles, and to travel safely and comfortably in vehicles. The mobility device can provide elevated, balanced travel.