H04L2209/84

OFFLINE MUTUAL AUTHENTICATION FOR BATTERY SWAPPING

An offline mutual authentication method for battery swapping includes communicating a first authentication request to a battery by a computing device associated with a battery charger. A first authentication response is communicated to the computing device. The first authentication response is verified, and a first challenge request is communicated to the battery. A first challenge response is communicated to the computing device. The first challenge response is verified, and a battery authentication status is communicated to the battery. A second authentication request is communicated to the computing device. A second authentication response is communicated to the battery. The second authentication response is verified, and a second challenge request is communicated to the computing device. A second challenge response is communicated to the battery. The second challenge response is verified, and a charger authentication status is communicated by the battery to the computing device.

Mitigating incompatibilities due to code updates in a system containing multiple networked electronic control units

An example operation may include one or more of receiving, by a validator node, candidate update code for installation on one of multiple networked ECUs of a vehicle as a target node, identifying one or more other ECUs on the network that communicate with the target node as impacted nodes, checking for known adverse conditions between the candidate update code and existing code of the impacted nodes, in the case an adverse condition is identified, preventing the update code from being installed on the target node, in the case no adverse condition is identified, and no adverse condition is identified by any peer validator node, allowing the update code to be installed on the target node, forming, by the validator node, a block containing information of the candidate update code and its installation disposition, and appending the block to a blockchain utilized by at least one of the peer validator nodes.

Unmanned vehicle management systems and methods
11206254 · 2021-12-21 · ·

This disclosure relates to systems and methods for managing the operation of unmanned vehicles within policy managed locations and/or areas. In some embodiments, an unmanned vehicle may issue an operator signed request to enter a policy managed area and/or use a certain sensor system within a policy managed area to an unmanned vehicle management system. The unmanned vehicle management system may verify the operator's identity and associated rights with a trusted authority, identify a policy associated with the policy managed area, and enforce the identified policy in connection with generating a response to the request. In this manner, the use of unmanned vehicles and/or associated systems may be managed in accordance with certain policies and/or rules associated with a particular operating location and/or area.

APPARATUS FOR CONFIGURING AND VALIDATING AN INTERVENTION IN A REAL-TIME ETHERNET DATA NETWORK
20210392013 · 2021-12-16 ·

An apparatus for configuring and validating an intervention in a real-time Ethernet data network for a motor vehicle includes: a vehicle diagnostic device, a first data storage device, a first data checking device, a second data storage device, and a second data checking device.

Management device, management system, key generation device, key generation system, key management system, vehicle, management method, key generation method, and computer program

A management device installed in a vehicle includes a master key storing part configured to share the master key that is used to generate an initial key held by an ECU together with an identifier of the ECU; a communication part configured to communicate with the ECU; a key generation part configured to generate the initial key of the ECU by use of the master key stored on the master key storing part and the identifier of the ECU received from the ECU via the communication part; and an initial key storing part configured to store the initial key of the ECU that is generated by the key generation part in connection with the identifier of the ECU.

Method for securing a direct communication connection

A method for securing a direct communication connection between a first and a second user equipment, both configured to operate with base stations of a wireless network, in which the first user equipment maintains an authentication code received from a first security center accessible via the wireless network, said first security center being assigned to a first area, the method comprising the steps for the first user equipment of: maintaining a trust level of the authentication code, reducing the trust level relating to the time of last access to one of the base stations of the wireless network, submitting to the second user equipment the authentication code and the trust level, for setting up the direct communication connection, and in case of reception of a confirmation transmission from the second user equipment: setting up the direct communication connection with the second user equipment.

Apparatus and method for providing and managing security information in communication system

The present disclosure relates to a technology for a sensor network, machine to machine (M2M) communication, machine type communication (MTC), and Internet of things (IoT). The present disclosure relates to an operation method of a first device in a communication system, the operation method comprising a step of receiving, from a server, security information of a second device associated with the first device, wherein the security information includes a first parameter associated with an operation of the second device, and attribute information associated with the first parameter.

Dynamic watermarking of vehicle camera images

A vehicle computer includes a watermark memory and a watermark processor programmed to execute instructions stored in the watermark memory. The instructions executed by the watermark processor include receiving an image captured by a camera, selecting a set of random pixel locations, generating a random watermark, and embedding the random watermark into the image at the set of random pixel locations. Another vehicle computer includes a validation memory and a validation processor programmed to execute instructions stored in the validation memory. The instructions executed by the validation processor include receiving a watermarked image, determining a random watermark, detecting an embedded watermark in the received watermarked image by selecting a set of random pixels and analyzing the selected set of random pixels for the random watermark, and authenticating the watermarked image as a result of determining that the watermarked image includes the random watermark at the set of random pixel locations.

AUTONOMOUS DRIVING CONTROLLER ENCRYPTED COMMUNICATIONS

An autonomous driving controller includes a plurality of parallel processors operating on common input data received from the plurality of autonomous driving sensors. Each of the plurality of parallel processors includes communication circuitry, a general processor, a security processor subsystem (SCS), and a safety subsystem (SMS). The communication circuitry supports communications between the plurality of parallel processors, including inter-processor communications between the general processors of the plurality of parallel processors, communications between the SCSs of the plurality of parallel processors using SCS cryptography, and communications between the SMSs of the plurality of parallel processors using SMS cryptography, the SMS cryptography differing from the SCS cryptography. The SCS and/or the SMS may each include dedicated hardware and/or memory to support the communications.

BATTERY-SWAPPING AND ENCRYPTION SYSTEM AND METHOD FOR ELECTRIC VEHICLE
20210380017 · 2021-12-09 ·

A battery-swapping and encryption system and method. The battery-swapping and encryption system comprises an encryption device (12). The encryption device (12) is used to receive a swapping-complete signal, and to set a swapping-authorized signal after receiving the swapping-complete signal. The swapping-complete signal is used to indicate that an electric vehicle has completed battery swapping in an authorized battery-swapping facility. The encryption device (12) is further used to store the swapping-authorized signal. The battery-swapping and encryption system and method can be used to detect whether battery swapping performed by a user conforms to operation regulations, thereby ensuring that batteries of a battery-swapping station circulate within the station itself without being lost.