H04L2209/84

REGULATING VEHICLE ACCESS USING CRYPTOGRAPHIC METHODS

A system and method of regulating access to a vehicle from a wireless device communicating using short-range wireless communications includes: transmitting a vehicle access certificate signing request from the wireless device to a central facility; receiving an authenticated vehicle access certificate from the central facility in response to the vehicle access certificate signing request, wherein the authenticated vehicle access certificate is signed using a central facility private key and includes the wireless device public key; transmitting the authenticated vehicle access certificate containing the wireless device public key from the wireless device to the vehicle via a short-range wireless communications protocol; receiving from the vehicle a shared secret that is encrypted by the wireless device public key; decrypting the received shared secret using a wireless device private key; generating a command controlling vehicle functions; and transmitting the command from the wireless device to the vehicle.

ELECTRIC VEHICLE BATTERY NETWORK MANAGEMENT SYSTEM, METHOD AND VEHICLE
20220305945 · 2022-09-29 ·

A battery network management system (1) for swappable batteries (5) used in vehicles (9), the system (1) comprising: at least one swappable battery (5) to discharge electrical power to drive a vehicle (9); and a charging station (3) to receive the swappable battery (5). The charging station (3) charges the swappable battery (5) based on a first condition that the swappable battery (5) is authenticated by an authentication system (7); and a first code (8) is associated with the swappable battery (5) to attest the swappable battery (5) was charged by the charging station (3) based on the first condition. The at least one swappable battery (5) discharges electrical power to drive a vehicle (9) based on a second condition that: the swappable battery (5) is received in the vehicle (9) that is authenticated by the authentication system (7); and the authentication system (7) authenticates the first code (8).

Notarizable electronic paper

A system and method helps to control “read” and/or “write” access to electronic paper (e-paper). Informational data may be on a restricted portion of e-paper material that is protected by a security methodology accessible to authorized entities. Some embodiments maintain a record of access activity regarding the restricted portion, and a record of access activity regarding use of an item or product or service related to the e-paper informational data. Some implementations include an authorization listing of a party having a particular access privilege or authorization to make modifications to various restricted portions including an authentication region and a protected region. One possible aspect includes performing a verification analysis of data indicia in a restricted portion of the e-paper media. Additional possible system and process components may determine an authenticity status of the data indicia, and provide an output result.

COMMUNICATION METHOD, TERMINAL DEVICE, ROAD SIDE UNIT, SERVER, SYSTEM, AND MEDIUM
20220311602 · 2022-09-29 ·

The present disclosure provides example terminal devices, road side units, and servers. One example terminal device performs operations including sending certificate request information to a certificate authority server, where the certificate request information includes identity information of the terminal device. A communication key sent by the certificate authority server is received by the terminal device. Encrypted information that is sent by a road side unit is received by the terminal device, where the encrypted information is information encrypted by using the communication key. The encrypted broadcast information is decrypted by the terminal device by using the communication key.

TRANSPORT GAIT AND GESTURE INTERPRETATION
20220035457 · 2022-02-03 ·

An example operation includes one or more of receiving, by a computer associated with a transport, a gait of an individual from at least one camera associated with the transport, validating, by the computer, the gait, receiving, by the computer, a gesture of the individual from the at least one camera, validating, by the computer, the gesture, and performing, by the computer, one or more functions based on the validated gait and the validated gesture.

SYSTEMS AND METHODS FOR DECENTRALIZING VEHICLE REGISTRATION USING BLOCKCHAIN
20220036465 · 2022-02-03 ·

A computer system for conducting proof of insurance using a blockchain configured to (i) receive a request for proof of insurance for a driver of a vehicle; (ii) search a blockchain for a most recent new policy entry associated with one or more of the driver and the vehicle, the blockchain includes a plurality of policy entries associated with vehicle insurance policies and a plurality of title entries associated with state property titles; (iii) determine that an active policy for the driver exists within the blockchain; and (iv) transmit an alert message indicating that the proof of insurance has been verified for the driver.

Computer program, method, and system for locksmithing
09727688 · 2017-08-08 · ·

A computer program, method, and system for locksmithing. The computer program, method, and system receive vehicle information, obtain a key code for a lock based on the vehicle information, decrypt the key code to determine key specification data, and provide the key specification data to a user, such that a duplicate key corresponding to the lock can be formed.

SECURE VEHICLE TO VEHICLE PTC COMMUNICATION

A computer-implemented method is provided that includes obtaining a first secret and a first public key, and obtaining a second secret a second public key. The method may also include authenticating the first public key of the first vehicle based on a first private key associated with the first vehicle, and authenticating the second public key of the second vehicle based on a second private key associated with the second vehicle. The method may also include preventing a man-in-the-middle attack, by securing at least one of a first vehicle-to-central office communication, a central office-to-first vehicle communication, or a first vehicle-to-second vehicle, wherein the first vehicle-to-central office communication and the central office-to-first vehicle communication are authenticated based on a determined private key associated with a respective first vehicle on-board computer, and sending a message, with the central office server, to a vehicle associated with a conditional movement authority.

TRANSPORT GAIT AND GESTURE INTERPRETATION
20220031197 · 2022-02-03 ·

An example operation includes one or more of receiving, by a computer associated with a transport, a gait of an individual from at least one sensor associated with the transport, validating, by the computer, the gait when the gait has corresponding frequency occurrence statistics above a predetermined gait threshold, responsive to the validating, providing, by the computer, access to the transport by the individual, receiving, by the computer, a sequence of gestures of the individual from at the at least one sensor, wherein the sequence of gestures corresponds to a function, validating, by the computer, the sequence of gestures, and responsive to the validating, performing, by the computer, the function responsive to the sequence of gestures being recognized as a known match with a pattern stored in memory.

METHOD AND SYSTEM FOR REDUCED V2X RECEIVER PROCESSING LOAD USING CERTIFICATES

A method at a computing device within an Intelligent Transportation System, the method comprising: determining, at the computing device, whether a short-term certificate is available to sign a message; if the short-term certificate is available, signing the message with a private key associated with the short-term certificate; if the short-term certificate is not available, signing the message with a private key associated with a long-term certificate; and sending the message to a recipient.