Patent classifications
H04L2209/84
TRANSPORT LANE USAGE
An example operation includes one or more of traveling, by a first transport, in a first lane, determining, by the first transport, that a speed of a second transport is greater than a speed of the first transport when the second transport is behind the first transport, determining, by the first transport, that no other transports are ahead of the first transport by a first distance in the first lane and beside the first transport by a second distance in a second lane, maneuvering, by the first transport, to the second lane allowing the second transport to pass the first transport in the first lane, and maneuvering, by the first transport, to the first lane when there are no other transports traveling in the first lane at a third distance behind the first transport and at or near the speed of the second transport.
AUTHENTICATING DEVICES OVER A PUBLIC COMMUNICATION NETWORK
Apparatus and method for authentication components of a public network are disclosed. A master compares an actual HMAC with an expected HMAC, determines that component fails authentication when the actual HMAC does not match the expected HMAC and causes at least one operation to be inhibited when component fails authentication for a preset number of times while the component is connected to the public network. The actual HMAC is determined by the component. The expected HMAC and actual HMAC are independently determined using the same process and using a key. The same key is stored, in advance, in both the master and the component and not transmitted. The master generates a random number and sends the same to the component. The expected HMAC and actual HMAC are determined using the random number input into a one-way hash function.
Policy and token based authorization framework for connectivity
A system including one or more servers, programmed to responsive to receiving a token request from a vehicle to access content stored in a content cloud, validate the token request against pre-defined policies; responsive to a successful policy validation, verify token generating responsibility based on a validation result and pre-defined rules; and responsive to verifying the system has the token generating responsibility, generate a token for the token request.
Multiparty Key Exchange
This invention pertains to secure communications between multiple parties and/or secure computation or data transmission between multiple computers or multiple vehicles. This invention provides a secure method for three or more parties to establish one or more shared secrets between all parties. In some embodiments, there are less than 40 parties and in other embodiments there are more than 1 million parties that establish a shared secret. In some embodiments, establishing a shared secret among multiple parties provides a method for a secure conference call. In some embodiments, a shared secret is established with multiple computer nodes across the whole earth to help provide a secure Internet infrastructure that can reliably and securely route Internet traffic. In some embodiments, a shared secret is established so that self-driving vehicles may securely communicate and securely coordinate their motion to avoid collisions. In some embodiments, a shared secret is established with multiple computer nodes that participate as a network, performing blockchain computations.
VEHICULAR ACCESS SYSTEM USING NFC READER IN DOOR HANDLE
A vehicular exterior door handle assembly includes a handle portion disposed at an exterior side of a door of a vehicle, and a printed circuit board (PCB) disposed at the handle portion. The PCB includes a near-field communication (NFC) reader that includes a microcontroller and an antenna. The antenna emits a magnetic field. The NFC reader detects disturbances in the emitted magnetic field. The NFC reader, responsive to detecting a disturbance in the emitted magnetic field from an NFC tag, adjusts operation of the NFC reader from a power-saving state of operation to an active state of operation. The NFC reader, when operating in the active state, wirelessly communicates an authentication signal to the NFC tag. The NFC reader, responsive to receiving a valid authentication response from the NFC tag, unlocks a door of the vehicle.
RELATIONSHIPS MANAGEMENT SYSTEMS, METHODS, AND APPARATUSES
Relationships management systems, methods, and apparatuses are discussed herein. Techniques may include establishing, in a relationships management system, a user profile. The user profile may be associated with at least a first access level comprising a first plurality of functions and a second access level comprising a second plurality of functions. The first access level and the second access level may be defined based at least in part on input via a user interface.
OFFLINE AUTHENTICATION OF BATTERIES
An offline authentication of batteries includes communicating an encrypted authentication request to secondary batteries and a vehicle controller by a primary battery of an electric vehicle. The encrypted authentication request is decrypted to obtain a first random number and a fleet flag. An encrypted authentication response, including a first random number, a second random number, and a vehicle identifier, is communicated to each battery. Each battery verifies the first random number and the vehicle identifier. An encrypted battery status, including the first and second random numbers and an authentication status, is communicated to the primary battery that verifies the first and second random number and the authentication status. The primary battery communicates an encrypted authentication message to the secondary batteries and the vehicle controller. The secondary batteries and the vehicle controller verify the first and second random numbers and the authentication status for authenticating each battery.
SYSTEM AND CRYPTOGRAPHIC HARDENING METHOD FOR TRAFFIC SIGNAL VERIFICATION
Examples are provided for traffic sign detection systems. In one example, a traffic detection system in a vehicle includes an image sensor, a communication system, a processor, and a storage device storing instructions executable by the processor to capture an image of an environment of the vehicle via the image sensor, process the image to detect visual information regarding a traffic sign in the image, the visual information indicating a recognized sign, receive cryptographic data via the communication system from a transmitter associated with the traffic sign, the cryptographic data including a cryptographic representation of a traffic sign signal for controlling the traffic sign, and selectively control one or more vehicle systems of the vehicle based on a cryptographic verification of the recognized sign using the cryptographic data.
AUTONOMOUS DRIVING RECORDER AND OPERATION METHOD THEREOF
An autonomous driving recorder and an operation method thereof, may include a storage including a secure world, an authenticator that stores an authentication key, and a data logger that writes information related to a running state of a vehicle during autonomous driving. The data logger accesses the secure world using the authentication key and writes data associated with a trigger signal among the information related to the running state in the secure world.
APPARATUS AND METHOD FOR COMMUNICATING DATA IN IN-VEHICLE NETWORK BASED ON AUTOMOTIVE ETHERNET
Disclosed are an apparatus and method for communicating data in an in-vehicle network. The method, performed by apparatuses for communicating data on a transmission side and a reception side, includes determining, by the apparatus on the transmission side, whether data collected from the in-vehicle network is changed; creating, by the apparatus on the transmission side, an authentication value based on the determination as to whether the data is changed, creating a message including the data and the authentication value and transmitting the message to the apparatus on the reception side; receiving, by the apparatus on the reception side, the message; creating, by the apparatus on the reception side, a verification value using data extracted from the message; and verifying, by the apparatus on the reception side, the integrity of the apparatus on the transmission side by comparing the authentication value extracted from the message with the verification value.