Patent classifications
H04L2209/84
COMPUTING DEVICE AND METHOD FOR OPERATING A COMPUTING DEVICE
A computing device, in particular, for a control unit of a motor vehicle. The computing device is configured to receive messages from at least one external unit. The computing device is configured to store the received messages at least temporarily and to transmit a plurality of the received messages to a cryptographic module, which is configured to execute a check of the transmitted messages.
METHODS, CONTROL DEVICES AND VEHICLES FOR AUTHENTICATION OF TRANSPORT MISSIONS
A method for enabling authentication of transport missions, performed in a control device of a member of a group comprising a plurality of autonomous vehicles and an off-board system. Each member in the group comprises a cryptographic function known by all other members. The method comprises signing, using the cryptographic function, information defining at least one transport mission to be performed by at least one of the autonomous vehicles in the group; and sending the signed information to a plurality of the other members of the group, in order to request them to authenticate the transport mission. The disclosure also relates to a corresponding method for authenticating transport missions, to control devices implementing the methods, to computer programs, to computer-readable storage mediums, and to autonomous vehicles.
SYSTEMS AND METHODS FOR MANAGING A COMPROMISED AUTONOMOUS VEHICLE SERVER
Systems and methods for managing a compromised autonomous vehicle server are described herein. A processor may obtain an indication of a first server configured to control an autonomous vehicle being compromised. The autonomous vehicle may have previously been provisioned with a first public key. The first public key may be paired with a first private key. A processor may compile command information. The command information may include a command for the autonomous vehicle and a digital certificate of a second server configured to control the autonomous vehicle in the event of the first server being compromised. The digital certificate may include a second public key and may be signed with the first private key. The command may be signed with a second private key associated with the second server. The second private key may be paired with the second public key.
SECURE TUNNELING FOR CONNECTED APPLICATION SECURITY
A computing platform of a vehicle may receive a request, from a mobile application accessing a secure vehicle function, to create a secure tunnel between the computing platform and the mobile device; retrieve an application certificate from the mobile application; and validate the creation of the secure tunnel using the application certificate and a module certificate from a local policy table of the computing platform. A mobile device, connected to a computing platform of a vehicle may execute a mobile application requiring a secure vehicle function; send a request to create a secure tunnel with the computing platform responsive to access of by the mobile application of the secure vehicle function; and send to the computing platform an application certificate corresponding to the mobile application to validate creation of the secure tunnel.
SERVICE-ORIENTED ARCHITECTURE IN A VEHICLE
A vehicle system includes a manager module, a node, and a wired vehicle communications network connecting the node and the manager module. The manager module is programmed to receive a request to publish or subscribe to a message topic from the node; authenticate the node using the request; authorize the node by verifying that the node is on a permission list for the message topic; and upon authenticating and authorizing the node, transmit a symmetric key to the node. The node is programmed to encrypt or decrypt messages about the message topic using the symmetric key.
Method and system of billing for charging a vehicle battery leveraging a pre-arranged payment method
A method and system provided for a single-action with which the customer places an order and receives goods by the single action of connecting an electrical vehicle (EV) to a charging station according to the business terms associated with this invention, the affiliated organizations that purchase or support the operation of the invention participate in a business “franchise” operation whereby all affiliated organizations increase their revenues as the volume of EV charging events increases.
ELECTRIC VEHICLE FLEET OF DELIVERY VEHICLES
An electric vehicle is in a fleet. A first electric vehicle includes one or more components that have unique identifications and a unique public key stored at the one or more components. When a message is received by the first electric vehicle, the first and second components provide a verification of their existence. The first and second components decrypt and verify their parts of the message. A first electric vehicle processor is provided. The first electric vehicle processor provides at least one of a database, an order module, a distribution module, and a loading module.
System and method for controlling access to an in-vehicle communication network
A system or method may include an in-vehicle network including an interface port for connecting an external device to the in-vehicle network; and a security unit connected to the in-vehicle network, the security unit adapted to enable an external device to communicate with the in-vehicle network, over the interface port, based on a security token received from the external device. A system or method may, based on a token, prevent an external device from at least one of: communicating with a selected set of components on in an in-vehicle network, communicating with a selected set of network segments in the in-vehicle network and performing a selected set of operations.
Device and method for vehicle-to-X communication in accordance with a degree of trust
A vehicle-to-X communication device for a vehicle, containing: a sending device for sending out vehicle-to-X messages, a receiving device for receiving vehicle-to-X messages, and a processing apparatus for processing vehicle-to-X messages to be sent and received. The communication device is configured to send out information for identifying a manufacturer of the vehicle and is furthermore configured to determine, by the processing apparatus, a level of trust of a vehicle-to-X message of a further vehicle received by the receiving device, utilizing information for identifying a manufacturer of the further vehicle which is contained by the vehicle-to-X message of the further vehicle. Furthermore, a corresponding method is disclosed.
Telematics offloading using V2V and blockchain as trust mechanism
Methods and systems for maintaining telematics data. The system includes a standard vehicle. The standard vehicle includes one or more sensors configured to detect telematics data, a memory configured to store a blockchain associated with the standard vehicle, an electronic control unit (ECU) configured to update the blockchain associated with the standard vehicle with the detected telematics data, and a transceiver configured to communicate the blockchain to one or more other vehicles. The system also includes a collection vehicle. The collection vehicle includes a transceiver configured to receive the blockchain from the standard vehicle, and communicate the blockchain from the standard vehicle to a network to update a distributed record of the blockchain associated with the standard vehicle.