H04L2209/84

Memory management for fleet operation of PEPS vehicles

Methods and apparatus are provided to dynamically configure a passive entry, passive start system to issue passive and active commands upon authentication of a remote keyless fob with a body control module in a given vehicle selected from a fleet of vehicles. In particular, a UID secret key data field is generated in the FOB data store using a fleet secret key data field and a vehicle secret key field retrieved from the BCM data store. A wakeup pattern data field stored in the FOB data store is generated with a fleet wakeup pattern data field and a master wakeup pattern data field retrieved from the BCM data store such that an approach wakeup pattern data field stored in the BCM data field is written to an approach wakeup pattern data field in the FOB data store when the remote fob is authenticated with the body control module.

Method for handling transmission of fraudulent frames within in-vehicle network

An anti-fraud method for use in an in-vehicle network system including a plurality of electronic control units that exchange data frames, each having added thereto a message authentication code (MAC), via at least one bus includes: receiving a data frame transmitted on the bus; generating a first MAC by using a MAC key and a value of a counter that counts the number of times a data frame having added thereto a MAC is transmitted; in a case where the verification has failed, (i) generating as second MAC by using an old MAC key; (ii) re-verifying that the received data frame has added thereto the generated second MAC; transmitting, in a case where the re-verification has succeeded, via the bus a key-update frame indicating a request for updating the MAC key; and updating the MAC key in response to the transmission of the key-update frame.

Communications security
09729329 · 2017-08-08 · ·

Examples herein are directed to communicating on a communication bus in accordance with a message-based signal protocol. One or more messages are generated with a data field, in which a portion of the data field is reserved for a signature. The signature has a bit length corresponding to a bit length of the reserved portion of the data field. The signature is coded in the portion of the data field reserved for the signature, and at least one message is transmitted with the signature coded therein. Each message received on the communication bus and having a signature coded in a data field therein is authenticated based on the signature, and processed by removing the signature from the data field and decoding the message with the signature removed.

SYSTEM AND METHOD FOR IDENTIFYING AND VERIFYING ONE OR MORE INDIVIDUALS USING FACIAL RECOGNITION

The invention encompasses systems and methods for identification, verification, and authentication of an individual by obtaining a biometric feature (e.g., facial recognition) of an individual using a mobile device (e.g., a mobile device camera). The system and method includes receiving from a mobile device biometric data of an individual captured by the mobile device (e.g., a camera on a mobile tablet), storing and encrypting the biometric data, securely forwarding the encrypted biometric data to a known server or database and receiving a request from the mobile device for authenticating of the individual, the request including biometric data captured by the mobile device, comparing the biometric data to known data of the individual stored on a database or server and the biometric data included in the request, and sending to the mobile device a response to the request for authenticating the individual based on a result of the comparison, wherein the response to the request allows verification of the individual and access to the individual to a secured area.

VALIDATING AN ELECTRONIC CONTROL UNIT OF A VEHICLE
20220272090 · 2022-08-25 ·

The present disclosure includes apparatuses, methods, and systems for validating an electronic control unit of a vehicle. An embodiment includes a memory, and circuitry configured to generate a run-time cryptographic hash based on an identification (ID) number of an electronic control unit of a vehicle and compare the run-time cryptographic hash with a cryptographic hash stored in a portion of the memory.

System and Method for Certificate Selection in Vehicle-to-Vehicle Applications to Enhance Privacy

A system and method are provided for certificate selection in infrastructures such as those planned to be used for V2V messaging, wherein the vehicle (or other moving object)'s location is used to aid in the selection of certificates. In one aspect, there is provided a method of selecting certificates for vehicle-to-vehicle messaging, the method comprising: determining a location for a vehicle; and adapting reuse of certificates in a certificate pool for the vehicle according to the location. In another aspect, there is provided a method of selecting certificates for vehicle-to-vehicle messaging, the method comprising: determining an amount of messaging activity; and adapting reuse of certificates in a certificate pool for the vehicle according to the amount of messaging activity.

Vehicle information inquiry method
11455426 · 2022-09-27 · ·

Disclosed is a vehicle information inquiry method including a logging step of acquiring an event ID for sharing anonymized vehicle information and vehicle travel information corresponding to the event ID from an external device, by a central server, a query step of receiving an inquiry about the event ID and the vehicle travel information corresponding to the event ID from an inquiry server, by the central server, and a responding step of transmitting the vehicle travel information corresponding to the event ID received from the inquiry server to the inquiry server, by the central server.

Data registration system
11455428 · 2022-09-27 · ·

Provided is a data registration system capable of efficiently registering data related to a vehicle while enhancing confidentiality. The data registration system includes an integration processing server and an integrated database server. The integration processing server creates a data mart having weather data, vehicle condition data, vehicle movement status data, fuel economy data, navigation data, a vehicle ID, and a user ID which are linked to one another and creates an encrypted data mart by encrypting the vehicle ID and the user ID in the data mart. The integrated database server stores the encrypted data mart as registered data in a storage region.

Artificial neural network integrity verification

An example method comprises receiving a number of inputs to a system employing an artificial neural network (ANN), wherein the ANN comprises a number of ANN partitions each having respective weight matrix data and bias data corresponding thereto stored in a memory. The method includes: determining an ANN partition to which the number of inputs correspond, reading, from the memory the weight matrix data and bias data corresponding to the determined ANN partition, and a first cryptographic code corresponding to the determined ANN partition; generating, using the weight matrix data and bias data read from the memory, a second cryptographic code corresponding to the determined ANN partition; determining whether the first cryptographic code and the second cryptographic code match; and responsive to determining a mismatch between the first cryptographic code and the second cryptographic code, issuing an indication of the mismatch to a controller of the system.

Using PKI for security and authentication of control devices and their data

Method for authenticating a first and a second electronic devices associated through a communication line includes: creating a unique ID, by a third electronic device; transmitting the unique ID to the first electronic device; signing the transmitted unique ID by the first electronic device; transmitting the signed unique ID to the second electronic device, by the first electronic device; signing the transmitted signed unique ID by the second electronic device; transmitting the unique ID signed by the first and second electronic devices to the third electronic device; verifying and accepting the unique ID signed by the first device and the second device, by the third device; issuing a certificate for a secure communication line between the first electronic device and the second electronic device; and transmitting the certificate to the first electronic device and the second electronic device.