H04L2209/84

Cryptographically secure mechanism for remotely controlling an autonomous vehicle

Disclosed are techniques for remotely controlling autonomous vehicles. In one embodiment, a method is disclosed comprising receiving a message from a first autonomous vehicle, the message including a signed body portion and a triple including components selected from the group consisting of a public identifier of the first autonomous vehicle, a public key of the first autonomous vehicle, and a certificate of the first autonomous vehicle; authenticating the message by verifying the certificate of the first autonomous vehicle; logging the message into a blockchain storage structure, the blockchain storage structure storing a plurality of blocks, each blocking including the signed body portion; and executing one or more orders included within the signed body portion.

Vehicle control system for cybersecurity and financial transactions

A vehicle control system includes a controller that is configured to include a memory, a verification module, and a software control module. The memory includes a software version repository to store a public address and one or more software hashes associated with the public address. The verification module is configured to verify a software upload request that includes a recommended software program to be uploaded. The verification module is configured to determine whether a contingent software hash that is indicative of the recommended software program matches a current software hash. The software control module is configured to acquire the recommended software program in response to the contingent software hash matching the current software hash.

Apparatus and method for managing pseudonym certificates and preventing tracking thereof

A pseudonym certificate management method, performed by a pseudonym certificate management apparatus interworking with an external server, may comprise: receiving, from the external server, a pseudonym certificate in a state locked based on a root value identifiable only by the external server; periodically receiving an unlocking key for the pseudonym certificate from the external server; activating the pseudonym certificate with the unlocking key; and when the activated pseudonym certificate is abnormal, deactivating the pseudonym certificate.

SYSTEM AND METHOD FOR INTERNET OF THINGS (IOT) SECURITY AND MANAGEMENT

System and method for establishing a secure communication between a plurality of Internet of Things (IoT) devices, includes provisioning a first and a second IoT devices by providing a unique identification, a digital identity token and a cryptographic key to each of the first and second IoT devices; authenticating the second IoT device by the first IoT device; inviting the second IoT device by the first IoT device to establish a communication line with the first IoT device; establishing a secure communication line between the first IoT device and the second IoT device by authenticating the communication line between the first IoT device and the second IoT device and issuing a digital certificate to the communication line between the first IoT device and the second IoT device; establishing secure communication lines between the first IoT device, the second IoT device and a plurality of more devices; and grouping the first IoT device, the second IoT device and the plurality of more devices into different groups based on a predetermined criteria.

SYSTEMS AND METHODS FOR MULTI-FACTOR DIGITAL AUTHENTICATION OF AIRCRAFT OPERATIONS

Methods and systems for authenticating operations of an aircraft are disclosed. In at least one embodiment, the method may include: receiving, by an aircraft data gateway, a request for an operation of an aircraft from an operations portal; performing a first digital authentication of the request using first digital authentication information; performing a second digital authentication of the request using second digital authentication information, the second digital authentication information being distinct from the first digital authentication information; and executing the operation of the aircraft upon validating the first digital authentication and the second digital authentication.

SECURITY CERTIFICATE MANAGEMENT METHOD FOR A VEHICULAR NETWORK NODE AND VEHICULAR NETWORK NODE APPLYING THE SAME

A security certificate management method for a vehicular network node is applied in a vehicular network. A message is received. Whether a certificate in the message is revoked is determined. If the certificate in the message is revoked, a regional certificate revocation list (RCRL) is generated or updated based on the revoked certificate by the vehicular network node, and the RCRL is transmitted into a communication range of the vehicular network node.

VEHICLE DATA ENCRYPTION

A wireless communication system includes a server, in communication with a vehicle controller. The server, in response to receiving from the controller a software update request including a timestamp, identifies a long key associated with the vehicle, encrypts the update beginning at a key offset into the long key generated from a manipulation of a data ordering of the timestamp, and transmits the encrypted update to the controller. A controller, in communication with a server, in response to receiving from the server an encrypted software update triggered by an update request transmitted by the controller and including a timestamp, identifies a long key associated with the vehicle, decrypts the update beginning at a key offset into the long key generated from a manipulation of data ordering of the timestamp, and initiates an installation of the decrypted update on the vehicle.

Authentication by use of symmetric and asymmetric cryptography

The present invention concerns a mutual authentication method in a communication system. According to the method, a first communication device (1), such as an RFID reader, authenticates a second communication device (3), such as an RFID tag, by using an asymmetric authentication protocol based on a generated a session key. The tag authenticates the reader by using a symmetric communication protocol based on a generated other session key. At least a portion of the session key is used to generate the other session key.

Apparatus for use in an automated fuel authorization program requiring data to be dynamically retrieved from a vehicle data bus during fuel authorization

Described herein is a fuel authorization program that requires data to be dynamically retrieved from a vehicle data bus during the fuel authorization process. This can be implemented using a smart cable that is installed in enrolled vehicles. The smart cable includes a housing suitable for commercial environments, a cable to logically couple the smart cable to the vehicle data bus, a second data link to be used to logically couple the smart cable to a fuel authorization “puck” in a vehicle, and a controller. The puck handles communication with the fuel vendor. The controller automatically implements the functions responding to a query from the puck received over the second data link by dynamically acquiring data from the vehicle data bus using the first data link, and conveying the data to the puck using the second data link.

MANAGEMENT DEVICE, KEY GENERATING DEVICE, VEHICLE, MAINTENANCE TOOL, MANAGEMENT SYSTEM, MANAGEMENT METHOD, AND COMPUTER PROGRAM
20170324558 · 2017-11-09 · ·

An automobile is equipped with a management device including a communication part for communicating with an ECU mounted on an automobile, an encryption processor for generating an encrypted key by encrypting a key, a key generation part for generating the key, and a key storage unit for storing the key generated by the key generation part. The communication part transmits the encrypted key to the ECU, while the encryption processor encrypts the key generated by the key generation part.