Patent classifications
H04L2209/84
METHOD AND SYSTEM FOR HANDLING DYNAMIC CYBERSECURITY POSTURE OF A V2X ENTITY
A method at a network element, the method including receiving at least one message at the network element, the at least one message being one or both of: an update status information message from an updates server; and an anomaly detection status information message from anomaly detection server; determining, based on the receiving the at least one message, a dynamic cybersecurity posture indication for an intelligent transportation system entity; and providing the dynamic cybersecurity posture indication for the intelligent transportation system entity to an Enrolment Authority, wherein the dynamic cybersecurity posture indication can be included in a certificate relating to the intelligent transportation system entity.
METHOD FOR AUTOMATIC RECOGNITION BETWEEN A MOBILE DEVICE AND A MOTOR VEHICLE, CAPABLE OF FUNCTIONING ACCORDING TO THE BLE PROTOCOL
The invention relates to a method for automatic recognition between a mobile electronic device (SP) and a motor vehicle (Vi) equipped with an electronic communication module (120), said mobile electronic device (SP) and the electronic module (120) of the vehicle (Vi) being capable of operating according to the BLE protocol, the mobile electronic device (SP) being in a “scanning”mode and the electronic communication module (120) of the vehicle (Vi) being in an “advertising” mode characterised in that it comprises various steps consisting of:—in the electronic module (120) of the vehicle (Vi), obtaining identification data (RPAi) of the vehicle (Vi);—transmitting at least one data frame (Td) comprising the identification data (RPAi) of the vehicle (Vi), from the electronic module (120) of the vehicle (Vi) to the mobile electronic device (SP);—receiving the at least one data frame (Td) containing the identification data (RPAi) of the vehicle (Vi), in the mobile electronic device (SP) set in “scanning” mode;—checking, in the mobile electronic device (SP), that the transmitted identification data (RPAi) is valid, then transmitting a connection request (110) from the mobile electronic device (SP) to the electronic module (120) of the vehicle (Vi).
Method and apparatus for automatically monitoring fuel tank ullage in an automated fuel authorization program
Described herein is a fuel authorization program that vehicles enrolled in the fuel authorization program to provide fuel tank sensor data in each fuel authorization request, so that an amount of fuel authorized will be limited to the amount needed to fill the vehicle's fuel tank, reducing a likelihood that fuel will be diverted. In at least some embodiments, the fuel authorization controller at the vehicle automatically uses the fuel tank sensor data and known tank size to include in a fuel authorization request sent to a fuel vendor data defining how much fuel is required to fill the vehicle fuel tanks. In at least some embodiments, the fuel vendor consults data from a source other than the vehicle (such as records maintained by the fuel authorization program) to determine how large the vehicles fuel tanks are, and to calculate how much fuel is required.
SYSTEMS AND METHODS FOR MAINTAINING A DISTRIBUTED LEDGER PERTAINING TO AUTONOMOUS VEHICLES
Methods and systems for maintaining a distributed ledger and/or blockchain of transactions and/or events pertaining to autonomous vehicles and/or smart contracts. An enforcement server may receive indications of transactions and/or events generated by one or more autonomous vehicles. The transactions and/or events may include information relating to a trigger condition and/or a decision condition associated with one or more smart contracts. The enforcement server may route the transaction to the appropriate smart contract to determine whether a trigger condition has been satisfied. When a trigger condition is satisfied, the enforcement server may automatically perform an action to enforce the smart contract and/or update the distributed ledger. In some aspects, the distributed ledger may record events associated with autonomous and semi-autonomous vehicle technology or system usage, including events associated with transitioning between manual and autonomous control, or vice versa, of one or more autonomous or semi-autonomous vehicles.
Transmission of authentication keys
A computer includes a processor and a memory storing instructions executable by the processor to, upon receiving an authorization message, transmit a plurality of new authentication keys to a respective plurality of control modules, the memory including an expiration time for the authorization message; update a listing of the control modules with respective statuses of the transmissions of the respective new authentication keys to the respective control modules, wherein each status is one of successful or unsuccessful; upon at least one status being unsuccessful, prevent the authorization message from expiring at the expiration time; after preventing the authorization message from expiring, retransmit the respective new authentication keys to each control module for which the respective status is unsuccessful; and then expire the authorization message.
COPY PROTECTION METHOD AND COPY-PROTECTED ELECTRONIC SYSTEM
A copy protection method for an electronic system has at least one electronic unit and at least one component which interacts with the electronic unit, in which at least one public-key infrastructure having at least one certification authority is used, wherein the certification authority issues at least one first certificate for the electronic unit and at least one second certificate for the at least one component, based on an identification feature of the electronic unit and of the component, respectively, and wherein, to check authenticity at least of the at least one component by means of the electronic unit, the respective certificates are at least mutually checked, wherein at least the first certificate is premade and loaded onto the electronic unit when producing and/or configuring the electronic unit, and/or at least the second certificate is premade and loaded onto the at least one component when producing and/or configuring the component.
KEY FOB AUTHENTICATION, RETENTION, AND REVOCATION
An electronic key fob device, in one embodiment, includes a transmitter, a counter configured to provide a current counter value indicated by a plurality of bits, a memory configured to store an operation key, and a processor coupled to the transmitter and memory. The processor is configured to encrypt the current counter value using the operation key to produce an encrypted counter value, select a subset of the plurality of bits of the current counter value, transmit a message the includes the encrypted counter value and the subset of plurality of bits of the current counter value.
SYSTEM AND METHOD FOR CONTROLLING ACCESS TO AN IN-VEHICLE COMMUNICATION NETWORK
A system or method may include an in-vehicle network including an interface port for connecting an external device to the in-vehicle network; and a security unit connected to the in-vehicle network, the security unit adapted to enable an external device to communicate with the in-vehicle network, over the interface port, based on a security token received from the external device. A system or method may, based on a token, prevent an external device from at least one of: communicating with a selected set of components on in an in-vehicle network, communicating with a selected set of network segments in the in-vehicle network and performing a selected set of operations.
IDENTIFYING SOFTWARE DEPENDENCIES USING CONTROLLER CODE MODELS
Disclosed herein are techniques for identifying software dependencies based on functional line-of-code behavior and relation models. Techniques include accessing a first line-of-code behavior and relation model representing execution of functions of a first portion of executable code, the first portion of executable code being associated with a first symbol; detecting a change to the first portion of executable code; constructing, based on the changed first portion of executable code, a second line-of-code behavior and relation model representing execution of functions of the changed first portion of executable code; determining, based on the constructed second model, a dependency between (i) the changed first portion of executable code or the first symbol and (ii) a second symbol; and generating, based on the determined difference, a report identifying the dependency.
ANONYMOUS COLLECTION OF DATA FROM A GROUP OF ENTITLED MEMBERS
A method for collecting data from a group of entitled members. The method may include receiving, by a collection unit, a message and a message signature; validating, by the collection unit, whether the message was received from any of the entitled members of the group, without identifying the entitled member that sent the message; wherein the validating comprises applying a second plurality of mathematical operations on a first group of secrets, a second group of secrets, and a first part of the message signature; and rejecting, by the collection unit, the message when validating that the message was not received from any entitled member of the group.