Patent classifications
H04L2209/84
RESPONDING TO DANGEROUS TRANSPORT-RELATED SOUNDS
An example operation includes one or more of detecting, by a transport, an increase in sound pressure of at least one portion of an audio stream, determining, by the transport, whether the increase in the sound pressure of the at least one portion is atypical audio, determining, by the transport, a probable root cause of the atypical audio, and initiating, by the transport, a response when the probable root cause is determined to be urgent.
REWRITE DETECTION SYSTEM AND INFORMATION PROCESSING DEVICE
Provided are a rewrite detection system and an information processing device capable of reducing communication traffic between devices and processing time in each device. A rewrite detecting device generates a random seed and transmits the random seed to an ECU, the ECU calculates a hash value using a predetermined hash function, and transmits the hash value to a rewrite detecting device. The ECU decides a storage region serving among storage regions of the storage unit, and calculates the hash value. The rewrite detecting device determines whether the hash value received from the ECU is right or wrong, and determines whether or not fraudulent rewrite has been performed. The ECU designates a storage region which is apart from a storage region used as a previous hash value calculation target by a predetermined address as a storage region of a current processing target.
MESSAGE AUTHENTICATION LIBRARY
A vehicle communication test system is described that includes a diagnostic computer having a computer program product stored thereon. The program product includes a non-transitory computer-readable medium for the diagnostic computer that includes an application software program stored on the computer-readable medium that includes instructions adapted to validate encrypted messages transmitted over a network connection in a vehicle. The instructions include: performing an initialization sequence that includes receiving initialization data at the diagnostic computer, wherein the initialization data is associated with a plurality of vehicle system modules (VSMs) which are coupled together via the vehicle network connection; receiving as a data input at the diagnostic computer an encrypted message transmitted over the network connection; and based on the initialization data, determining at the diagnostic computer whether the received encrypted message is valid.
REMOTE HARDWARE ACCESS SERVICE
A system comprising one or more computers implements a hardware feature access service. The hardware feature access service stores private keys that correspond to digital certificates embedded in chipsets of devices enrolled in the hardware feature access service. The hardware feature access service is configured to issue access or access revocation messages to the chipsets to “lock” or “unlock” associated hardware components. The hardware feature access service also implements a service interface that allows clients to request changes to enabled feature sets for devices enrolled in the hardware feature access service. In response to such requests, the hardware feature service automatically and wirelessly enables or disables feature sets by locking or unlocking relevant hardware components of a device relevant to enabling or disabling the requested feature sets.
Smartphones based vehicle access
A symmetric key-based generation and distribution system and method for a vehicle access authentication framework is provided, the framework comprising: a first device operated by a car owner, a second device operated by a delegated user, and a third device residing in a vehicle. The first device is configured to: request for an authentication key from the third device, the request for the authentication key comprising an ID of the first device, id.sub.O; receive an authentication key K.sub.id.sub.
Systems and methods for securing communication data and property using blockchain
Blockchain-based systems and methods are used to control access to property. One system includes a mobile device, a key fob, and a server. The mobile device generates an encrypted code and transmits it to the key fob. The key fob transmits the encrypted code to the property and the server updates a log of the key fob in a hyper ledger. The property includes a computing device that validates the encrypted code and grants a key fob user access to the property. Another system includes a server that validates an access key and a first station that transmits an access key to a second station via the server and a satellite. The second station transmits data to the first station via the server and the satellite. The server saves a transmission log in a hyper ledger and transmits the access key in response to a request by the first station.
System and method for establishing real-time location
A communication system with a master device configured to determine location information in real-time with respect to a portable device. The master device may direct one or more monitor devices to monitor communications that occur over a primary communication link. The monitor devices may sense characteristic information about the signal from the portable device, and communicate this characteristic information to the master device via an auxiliary communication link. The communication system may determine location of the portable device, authenticate the portable device, determine whether the portable device is authorized to allow or initiate an action, and command or enable an action with respect to equipment.
AUTOMATED SECURITY POLICY GENERATION FOR CONTROLLERS
In one implementation, a method for automatically generating a security policy for a controller includes receiving, by a security policy generation system and from a controller development environment, code for a device controller; selecting middleware that enforces a security policy; analyzing the code for the device controller; based at least in part on the analyzing, automatically generating the security policy; and providing the selected middleware along with the generated security policy.
Systems and methods for implementing robotics frameworks
Systems, methods, and non-transitory computer-readable media can receive a message transmitted over a robotics framework implemented on a vehicle. A determination can be made that the message satisfies criteria for multi-threaded hashing. The message can be divided into two or more message segments. A hash can be independently computed for each message segment of the two or more message segments to generate two or more message segment hashes. A message hash can be determined for the message based on the two or more message segment hashes.
Secure overlay multicast
A system and method for cryptographically securing data communications between a group of networked devices establishes and maintains an overlay network at the Application Layer, on top of a unicast routing service provided at the Internetworking Layer. The overlay network provides first, the routes that are used to deliver multicast datagrams and second, the cryptographic keys used to secure multicast datagrams. A common cryptographic key is established between all members of each group, and end-to-end encryption ensures that multicast datagrams can be accessed only by authorized group members. In other embodiments, keys are established between pairs of adjacent devices in the overlay network, and hop-by-hop encryption ensures that multicast datagrams can be accessed only by overlay network members.