Patent classifications
H04L2209/84
Vehicle information collection system, vehicle-mounted computer, vehicle information collection device, vehicle information collection method, and computer program
An in-vehicle computer generates a message authentication code about its own log using its own signature key and thereby transmits a log annotated with its message authentication code to a vehicle information collection device. The vehicle information collection device generates the signature key of the in-vehicle computer, verifies the message authentication code, which is included in the log annotated with its message authentication code received from the in-vehicle computer, using generated signature key, and thereby stores the log relating to the successfully verified message authentication code on storage media.
Method, computer-readable medium, system and vehicle comprising the system for providing a data record of a vehicle to a third party
A method for providing a data record of a vehicle to a third party includes: receiving a cryptographic key pair including a public, cryptographic key and a private, cryptographic key; receiving the data record of the vehicle; encrypting the received data record by the public, cryptographic key; transmitting the encrypted data record to a data memory for storing the encrypted data record; generating a cryptographic hash value for the encrypted data record; transmitting the hash value of the encrypted data record to a blockchain database for storing the hash value of the encrypted data record; receiving a request message from a third party for retrieving the data record; generating a first request message to the data memory and a second request message to the blockchain database on the basis of the received request message; transmitting the first request message to the data memory and the second request message to the blockchain database; receiving the encrypted data record from the data memory in response to the first request message and the hash value of the encrypted data record from the blockchain database in response to the second request message; validating the encrypted data record by the hash value; and, when validation of the encrypted data record is successful: decrypting the encrypted data record by the private, cryptographic key; and transmitting the data record in response to the request message from the third party to a server of the third party.
Cognitive operational vehicle blockchain for privileges, licensing, evaluation, authorization, and training
Providing a cognitive blockchain for user privileges is provided. A distributed secure encrypted ledger is established for storing information related to privileges for users across a plurality of nodes in a permissioned network with known identities. An internet of things (IoT) device node in the plurality of nodes records a first block in the distributed secure encrypted ledger containing activity information related to a privilege corresponding to a user of the IoT device node. A licensing node in the plurality of nodes evaluates information in the first block. The licensing node records a second block containing privilege information corresponding to the user of the IoT device node based on the evaluating.
Temporary and customized vehicle access
A vehicle includes a processor programmed to validate, using a public key of a lender device, authenticity of a file including permissions for a borrower device signed using a private key of a lender device, and responsive to validating, using a public key of a borrower device, a session request from the borrower device signed with a private key of the borrower device, establish a secure connection with the borrower device over which access to the vehicle is granted per the permissions.
Distributed ledger system for material monitoring
Techniques are described for monitoring the status and transportation of materials. A monitoring platform can employ a distributed ledger system (DLS) and provide a mechanism by which various entities can access information regarding the status of transported materials, and receive alerts regarding issues arising during transport. The platform can also include logic (e.g., smart contract(s)) that executes to perform actions automatically in response to detected issues. Such actions can include remediation actions to compensate a stakeholder in the event of a theft, degradation, or other loss of transported material. The platform can receive sensor data generated by one or more devices that can be present in a vehicle that transports the material, and the data can be analyzed to identify anomalies. Alerts can be generated based on anomalies, and the alert(s) and/or sensor data can be stored on the DLS to be accessible by entities and/or logic.
Visualization of code execution through line-of-code behavior and relation models
Disclosed herein are techniques for visualizing and configuring controller function sequences. Techniques include identifying at least one executable code segment associated with a controller; analyzing the at least one executable code segment to determine at least one function and at least one functional relationship associated with the at least one code segment; constructing, a software functionality line-of-code behavior and relation model visually depicting the determined at least one function and at least one functional relationship; displaying the software functionality line-of-code behavior and relation model at a user interface; receiving a first input at the interface; in response to the received first input, animating the line-of-code behavior and relation model to visually depict execution of the at least one executable code segment on the controller; receiving a second input at the interface; and in response to the received second input, animating an update to the line-of-code behavior and relation model.
SYSTEMS AND METHODS FOR ESTABLISHING IDENTITY FOR ORDER PICK UP
Example embodiments of systems and methods for secure online order pick up and data transmission system between transmitting and receiving devices are provided. In an example embodiment, a user may be required to confirm his or her identity prior to using an application, utilizing enhanced or restricted features of an application or device, viewing sensitive information, or taking certain actions. A transmitting device, such as a contactless card, may be employed as means for confirming a user's identity and access these features.
APPROACH FOR SECURING A VEHICLE ACCESS PORT
The disclosure reveals a system having secured electronic access. The system may have one or more vehicle buses, one or more electronic control units on a vehicle connected to the one or more vehicle buses, a security module connected to the one or more vehicle buses, and a vehicle access port connected to the security module. An accessing entity may attempt connection to the vehicle access port. Messages injected or extracted by the accessing entity may be authorized or unauthorized at the security module based on a security policy.
System and method for performing an asymmetric key exchange between a vehicle and a remote device
Methods and apparatus are provided for performing an asymmetric key exchange between a vehicle and a first remote device. The method comprises storing predetermined cryptographic information on the vehicle, generating a first public key and a first private key that correspond to the vehicle, storing the first private key on the vehicle, and providing the first public key and descriptive data associated with the vehicle to a trusted entity, wherein the trusted entity is configured to store the first public key and the descriptive data in a location that is accessible to the first remote device.
GENERATING HASH VALUES
A device is suggested for processing input data including a hardware accelerator generating a first hash value based on a first portion of the input data and a second hash value based on a second portion of the input data, wherein the first hash value is generated based on a first configuration of the hardware accelerator and wherein the second hash value is generated based on a second configuration of the hardware accelerator. Also, a method for operating such device is provided.