Patent classifications
H04L2209/84
Verifying identity of an emergency vehicle during operation
A method includes: receiving, by a computing device of a first vehicle, a command from a host device; in response to receiving the command, storing a new device secret in memory; generating, by the computing device using the new device secret, a triple comprising an identifier, a certificate, and a public key; and sending, by the computing device, the triple to a second vehicle, where the second vehicle is configured to verify an identity of the first vehicle using the triple.
Method, apparatus, and system for embedding information into probe data
An approach is provided for embedding information into probe data. The approach involves retrieving a probe data set comprising a plurality of probe data points collected from a probe device. The approach also involves determining the information to embed, wherein the information is a bit string of a specified length. The approach further involves iteratively selecting at least one bit of the bit string to embed into at least one probe data point of the plurality of probe data points to generate an embedded probe data set until at least a predetermined portion of the bit string is embedded. The approach further involves providing the embedded probe data set as an output.
Offline mutual authentication for battery swapping
An offline mutual authentication method for battery swapping includes communicating a first authentication request to a battery by a computing device associated with a battery charger. A first authentication response is communicated to the computing device. The first authentication response is verified, and a first challenge request is communicated to the battery. A first challenge response is communicated to the computing device. The first challenge response is verified, and a battery authentication status is communicated to the battery. A second authentication request is communicated to the computing device. A second authentication response is communicated to the battery. The second authentication response is verified, and a second challenge request is communicated to the computing device. A second challenge response is communicated to the battery. The second challenge response is verified, and a charger authentication status is communicated by the battery to the computing device.
CONTEXT-BASED SECURE CONTROLLER OPERATION AND MALWARE PREVENTION
In one implementation, a method for providing security on an externally connected controller includes launching, by the controller, a security layer that includes a whitelist of permitted processes on the controller, the whitelist including (i) signatures for processes that are authorized to be executed and (ii) context information identifying permitted controller contexts within which the processes are authorized to be executed; determining, by the security layer, whether the particular process is permitted to be run on the controller based on a comparison of the determined signature with a verified signature for the particular process from the whitelist; identifying, by the security layer, a current context for the controller; determining, by the security layer, whether the particular process is permitted to be run on the controller based on a comparison of the current context with one or more permitted controller contexts for the particular process from the whitelist.
FLEET TRIGGER-BASED INCENTIVES WITH BLOCKCHAIN
A server including an interface configured to communicate with a blockchain network having a plurality of nodes including a vehicle, and a first entity; and a processor, programmed to receive a plurality of trigger events of a first cluster broadcasted by the vehicle to the blockchain network, receive a first request from the first entity to access the plurality of trigger events of the first cluster, send a first key to the first entity to allow the access to the plurality of trigger events of the first cluster, receive a plurality of trigger events of a second cluster broadcasted by the vehicle to the blockchain network, receive a second request from the first entity to access the plurality of trigger events of the second cluster, and decline the second request,
EVIDENCE ORACLES
Systems and methods are disclosed with respect to using a blockchain for managing the subrogation claim process related to a vehicle collision, in particular, utilizing evidence oracles as part of the subrogation process. An exemplary embodiment includes receiving recorded data from one or more connected devices at a geographic location; analyzing the recorded data, wherein analyzing the recorded data includes determining that an collision has occurred involving one or more vehicles; generating a transaction including the data indicative of the collision based upon the analysis; and transmitting the transaction to at least one other participant in the distributed ledger network.
INTRUSION PATH ANALYSIS DEVICE AND INTRUSION PATH ANALYSIS METHOD
The control network system is connected to electronic control unit(s) and a communication device, and includes security sensor(s) that transmits a security alert indicating that an indication of a security breach is detected to the network, if the indication is detected in at least one of the network, the electronic control unit(s), or the communication device. The intrusion path analysis device includes: an alert obtainer that obtains the security alert from the security sensor(s); an event obtainer that obtains an event history of an event that occurs in the control network system; and an intrusion path analyzer that performs an analysis on an intrusion path of an attack on the basis of the security alert, the event history, and an intrusion depth indicating an intrusion level to be assumed in a case the security alert occurs, and that outputs a result of the analysis.
CRYPTOGRAPHIC COMMUNICATION SYSTEM, CRYPTOGRAPHIC COMMUNICATION METHOD, AND CRYPTOGRAPHIC COMMUNICATION APPARATUS
A cryptographic communication system includes: a first cryptographic communication apparatus including a first tamper-resistant device configured to store a first key generation function and a first storage unit configured to store first individual information; and a second cryptographic communication apparatus including a second tamper-resistant device configured to store a second key generation function and a second storage unit configured to store second individual information. The first cryptographic communication apparatus generates a twelfth shared key using the first key generation function and the second individual information. The second cryptographic communication apparatus generates a twenty first shared key using the second key generation function and the first individual information.
Digital composition hashing
Examples associated with digital composition hashing are described. One example method includes receiving a digital composition file from a user. The digital composition file may include a top-level design and a hierarchy of sub-level designs. A hashed structure may be generated from the digital composition file, where a node in the hashed structure for the first sub-level design is generated based on hashes of sub-level designs below the first sub-level design in the hierarchy. The hashed structure and a hash of the digital composition file are stored in association with the user.
Method and system for reduced V2X receiver processing load using certificates
A method at a computing device within an Intelligent Transportation System, the method comprising: determining, at the computing device, whether a short-term certificate is available to sign a message; if the short-term certificate is available, signing the message with a private key associated with the short-term certificate; if the short-term certificate is not available, signing the message with a private key associated with a long-term certificate; and sending the message to a recipient.