H04L2209/84

Local ledger block chain for secure electronic control unit updates

The present disclosure includes apparatuses, methods, and systems for using a local ledger block chain for secure electronic control unit updates. An embodiment includes a memory, and circuitry configured to receive a global block to be added to a local ledger block chain for validating an electronic control unit update for electronic control unit data stored in the memory, where the global block to be added to the local ledger block chain includes a cryptographic hash of a current local block in the local ledger block chain, a cryptographic hash of the electronic control unit data stored in the memory to be updated, where the current local block in the local ledger block chain has a digital signature associated therewith that indicates the global block is from an authorized entity.

Protection against relay attack for keyless entry systems in vehicles and systems
11399287 · 2022-07-26 · ·

Aspects of the subject disclosure may include, for example, a device in which a processing system of a remote entry system selects a first circuit from a plurality of circuits of a key remote from the device; wirelessly transmits a first challenge signal to the key, the first challenge signal specifying the first circuit; and wirelessly receives a first response signal from the key, the first response signal having a first response signal power level and a first response signal delay with respect to the first challenge signal. The processing system analyzes the first response signal by comparing the first response signal power level and the first response signal delay respectively with a predetermined first signal power and predetermined first time delay associated with the first circuit; and, in accordance with the comparing, determines whether to enable the entry system. Other embodiments are disclosed.

Generating hash values

A device is suggested for processing input data including a hardware accelerator generating a first hash value based on a first portion of the input data and a second hash value based on a second portion of the input data, wherein the first hash value is generated based on a first configuration of the hardware accelerator and wherein the second hash value is generated based on a second configuration of the hardware accelerator. Also, a method for operating such device is provided.

Remote hardware access service
11397823 · 2022-07-26 · ·

A system comprising one or more computers implements a hardware feature access service. The hardware feature access service stores private keys that correspond to digital certificates embedded in chipsets of devices enrolled in the hardware feature access service. The hardware feature access service is configured to issue access or access revocation messages to the chipsets to “lock” or “unlock” associated hardware components. The hardware feature access service also implements a service interface that allows clients to request changes to enabled feature sets for devices enrolled in the hardware feature access service. In response to such requests, the hardware feature service automatically and wirelessly enables or disables feature sets by locking or unlocking relevant hardware components of a device relevant to enabling or disabling the requested feature sets.

IDENTIFYING SOFTWARE INTERDEPENDENCIES USING LINE-OF-CODE BEHAVIOR AND RELATION MODELS
20210406163 · 2021-12-30 · ·

Disclosed herein are techniques for identifying software interdependencies based on functional line-of-code behavior and relation models. Techniques include identifying a first portion of executable code associated with a first controller, accessing a functional line-of-code behavior and relation model representing functionality of the first portion of executable code and a second portion of executable code; determining, based on the functional line-of-code behavior and relation model, that the second portion of executable code is interdependent with the first portion of executable code; and generating, based on the determined interdependency, a report identifying the interdependent first portion of executable code and second portion of executable code.

IMMOBILIZER TOKEN MANAGEMENT SYSTEM
20210409200 · 2021-12-30 ·

The present disclosure relates to an immobilizer token management system, and an embodiment may include generating immobilizer token indices, generating a digital key according to a request for the issuance of a digital key received from a digital key sharing device, mapping the digital key to one of the immobilizer token indices, and transmitting, to the digital key sharing device, the digital key and the immobilizer token index mapped to the digital key.

A METHOD AND SYSTEM FOR CHARGING ELECTRIC VEHICLES (EVS) USING BLOCK CHAIN
20220227251 · 2022-07-21 ·

The present invention relates to a method and a system for charging Electric Vehicles (EV) (101) at charging points associated with a first or a second energy distribution vendor (104). A charging point (103) connected to an electric vehicle system operator (EVSO) (105) receives information related to the EV (101) and an energy transaction for charging the EV (101). The EVSO (105) verifies the identity of the EV and charging point (101) and authorizes the charging point (103) to charge the EV (101) based on the energy transaction. The EVSO (105) determines the one or more sister block chain (401, 402 and 403) associated with the first or the second distribution vendor for storing the energy transaction. The EVSO (105) stores all the energy transactions associated with plurality of energy distribution vendors (104) in a mother block chain (404). Upon receiving the authorization, the charging point (103) charges, the EV (101).

METHOD FOR ASSESSING SAFETY OF THE INTENDED FUNCTIONALITY OF AUTONOMOUS DRIVING BASED ON DAG BLOCK CHAIN, AND DEVICE

A method for assessing Safety Of The Intended Functionality of autonomous driving based on DAG block chain is provided. The method is based on DAG block chain technology and fused with system of the intended functionality, realizing safety assessment of the intended functionality. The intended functionality is objectively assessed based on data. The assessment method, in combination with an in-the-loop test, analyzes the current test data, without relying on a large amount of traditional experience to make judgments. Result of credit assessment of the nodes is taken as a result of safety assessment. Each of hardware or components is analyzed in terms of the safety and reliability, and the result of assessment is relatively complete. A device and a computer-readable storage medium are further provided.

OPERATING METHOD OF PHYSICALLY UNCLONABLE FUNCTION MAGNETIC MEMORY DEVICE

A physically unclonable function magnetic memory device includes a plurality of magnetic resistance cells disposed on a substrate and each including a pinned magnetic layer, a free magnetic layer, and a tunnel insulating layer or a non-magnetic conductive layer interposed between the pinned magnetic layer and the free magnetic layer. In an operating method of the physically unclonable magnetic memory device, an external magnetic field, decaying with time, is applied to the plurality of magnetic resistance cells to randomize a magnetization direction of the free magnetic layer of each of the plurality of magnetic resistance cells.

METHOD FOR DELEGATED KEY SHARING FOR DIGITAL CAR KEY SYSTEM
20220231862 · 2022-07-21 ·

A system and method for sharing a digital key for a vehicle. The system includes a first digital key device having a digital key stored thereon, a second digital key device, and a vehicle server. The first digital key device sends a request to the vehicle server for a key sharing session. The vehicle server commences a key sharing session in response to the request. The first digital key device shares the digital key to a second digital key device. The vehicle server ends the key sharing session.