Patent classifications
H04L2209/84
Vehicular system for processing encryption key and electronic control device
A vehicular system includes a first electronic control device that manages an encryption key, and a second electronic control device that uses the encryption key. The first electronic control device is configured to create the encryption key in response to that an owner of a vehicle has changed, and output the encryption key to the second electronic control device. The second electronic control device is configured to store a first encryption key and a third encryption key, receive a second encryption key, switch the encryption key being used, and update the first encryption key to the second encryption key.
Transceiver and transceiver systems
A transceiver is disclosed including a transmitter designed to output a first signal according to a physical communication protocol, and to output a second signal comprising at least one cryptographic datum. The first and the second signal may be overlaid onto one another as an overlay signal at the output of the transceiver, and may comply with the physical communication protocol. The overlay signal may be received and processed by a receiver.
Authentication PIN collision prevention for autonomous vehicles
A vehicle ridesharing system includes a user interface used to interact with rideshare passengers. The interface matches a selected user identifier with a PIN index and sends the PIN index to a vehicle body control module (BCM) of the vehicle through an unsecure communication channel. The BCM uses the PIN index to select a salt value and a nonce associated with a unique user associated with the PIN index, and sends a salt and a nonce back to the interface through the unsecure channel. The user enters a PIN value into the interface to authenticate their identity for the rideshare service. The interface generates a first hash result by hashing the PIN value with the salt and the nonce received from the BCM, and sends the hashed result back to the BCM for authentication.
Methods and systems for improving human hair and scalp using vehicle cameras and big data AI analytics
Hair loss/gain and scalp changes are monitored using vehicle cameras and sensors of connected vehicles. Each vehicle is equipped with at least one camera which images the hair and scalp of a person riding in the vehicle. Each vehicle is operatively connected to a hair and scalp improvement application in a computing cloud which includes a registration module which registers each vehicle. Additionally, the person may register with the hair and scalp improvement application to have his/her hair and scalp analyzed when travelling in any of the registered vehicles. The hair and scalp improvement application is operatively connected to a hair and scalp data artificial intelligence (AI) analytics module and a data lake to search and analyze information related to the changes in the hair and scalp images. A hair and scalp treatment recommendation is transmitted to the person.
IMPROVEMENTS IN THE TRANSMISSION OF DATA OR MESSAGES ON BOARD A VEHICLE USING A SOME/IP COMMUNICATION PROTOCOL
A method for transmitting messages on a communications network on board a vehicle between a requesting entity requesting a service instance and an offering entity offering a service instance using a Service Oriented MiddlewarE over Internet Protocol (SOME/IP) communication protocol is provided. The method includes a preliminary mutual authentication step between the requesting entity and the offering entity in view of a communication associated with the service instance, including verifying existence and mutual validity of a pre-assigned certificate of the requesting entity and the offering entity, authorizing access to the service instance, verifying that security level of the service offered by the offering entity is not lower than a minimum security level pre-assigned to the service at the requesting entity and at the offering entity and transmitting at least one communication message associated with the service instance from the offering entity to the requesting entity and vice versa based on successful security level verification and successful pre-assigned certificate verification.
ELECTRONIC DEVICE AUTHENTICATION METHOD, AND APPARATUS ACCORDING THERETO
The disclosure relates to a method and apparatus for authenticating an electronic device. An operating method of a target device according to an embodiment includes generating a random value based on whether an electronic device is within a certain distance from the target device, transmitting, to the electronic device, first information including the generated random value and identification information of the target device, and receiving, from the electronic device, first authentication information obtained based on the first information, encrypting the received first authentication information and a target device key, transmitting the encrypted target device key and the encrypted first authentication information to a server, and receiving, from the server, second authentication information obtained based on the first authentication information, and determining whether to open or close a door based on a comparison between the second authentication information and the random value.
System and method for detecting non-approved parts in a vehicle
A method for detecting non-approved parts in a vehicle includes generating a plurality of component identifiers (IDs) for a plurality of components, wherein each component ID identifies a unique component of the plurality of components. The component IDs are stored to a decentralized database. A vehicle identifier (ID) that uniquely identifies a vehicle is generated and stored to the decentralized database. Component IDs associated with components of the vehicle that are stored in the decentralized data base are associated with the vehicle ID. The method includes subsequently, determining that a component of the vehicle has been replaced with a replacement component and searching the decentralized database for a component ID associated with the replacement component. When the component ID associated with the replacement component is not found, the replacement component is determined to be a counterfeit component or a misfit component with respect to the vehicle's ID and an alert is issued to the vehicle indicative of the determination. Otherwise when the component ID associated with the replacement component is found, the decentralized database is updated to associate the component ID associated with the replacement component with the vehicle ID.
Blockchain Tokenization of Aircraft and Other Complex Machinery
A method of blockchain tokenization of aircraft and other complex machinery includes creating a series of nesting Blockchain Smart Contracts (BSC) or Blockchain Nonfungible Tokens (BNFT) to digitally twin the complete structure of an aircraft or other complex machines, and collect data from the series of nesting BSC or BNFT through the full product life cycle. Each BSC or BNFT represents a part of the aircraft or other complex machine, from an individual part level (Xp) to a component level (Xc) to a subsystem level (Xss) and/or a system level (Xs) to an aircraft or other complex machine level (Xa), in a cascading architecture. The collected data may be used to perform reverse forensics in the case of a part failure or mishap, and/or to track and trace a part of the aircraft or other complex machine.
Vehicle security system and vehicle security method
A vehicle security system includes a terminal device, a server device, and a vehicle. The terminal device includes a token acquisition unit and a terminal communication unit configured to transmit the token, terminal identification information, and vehicle identification information to the server device. The server device includes a server communication unit, a server determination unit configured to determine that authentication has succeeded, and a server storage unit configured to store the terminal identification information and the vehicle identification information received from an authenticated terminal device in association. The server communication unit transmits the token and the terminal identification information to the vehicle of the vehicle identification information. The vehicle includes a vehicle communication unit, a vehicle determination unit configured to determine that authentication has succeeded, and a vehicle storage unit configured to store the received terminal identification information in association with the token of authentication success.
Vehicle blockchain transactions
A system is disclosed that may comprise: one or more processors of a center node, wherein the center node is a vehicle computer; and memory of the center node, wherein the memory stores instructions executable by the one or more processors, the instructions comprising to: determine a first network comprising the center node and a plurality of member nodes based on a mesh network of the center node and the plurality of member nodes; add at least one virtual node to the first network; and using the first network, exchange cryptographic data between the at least one virtual node, the center node, and the plurality of member nodes.