H04L2209/84

VEHICULAR DRIVER MONITORING

Disclosed herein is a vehicle theft prevention device. The device can include a data store including event configuration data. The device can include one or more sensors that can sense various types of measurements proximate to a vehicle. The device can include a computing device in communication with the sensors. The computing device can read measurements from the sensors and determine that a particular event has occurred. The computing device can analyze the measurements to determine the particular event occurred based on the event configuration data. When the particular event occurs, the computing device can perform one or more remedial actions.

POINT-OF-INTEREST-BASED ANTI-VEHICLE THEFT SYSTEMS AND PROCESSES FOR USING THE SAME

A sensing device can include at least one sensor, positioning circuitry, a transceiver, and a computing device in communication with the at least one sensor, the positioning circuitry, and the transceiver. The computing device can determine a location of a vehicle via the positioning circuitry. The computing device can determine that a point of interest (POI) associated with a predefined category of POIs corresponds to the location. The computing device, via the transceiver, can determine that a person is moving away from the vehicle based on a measurement associated with a remote device. The computing device can enter into an armed mode in response to the determinations. The computing device can detect an intrusion into a vehicle while in the armed mode based at least in part on measurements from the at least one sensor. The computing device can generate an alarm in response to the intrusion.

VEHICULAR SAFETY MONITORING

Disclosed herein is a vehicle theft prevention device. The device can include a data store including event configuration data. The device can include one or more sensors that can sense various types of measurements proximate to a vehicle. The device can include a computing device in communication with the sensors. The computing device can read measurements from the sensors and determine that a particular event has occurred. The computing device can analyze the measurements to determine the particular event occurred based on the event configuration data. When the particular event occurs, the computing device can perform one or more remedial actions.

APPARATUS AND METHOD FOR CLOUD-BASED VEHICLE DATA SECURITY MANAGEMENT

Disclosed herein are an apparatus and method for processing vehicle data security based on a cloud. The method may include requesting, by a vehicle, a cloud center device to register a cloud-based vehicle data security service; generating, by the cloud center device, cloud-based vehicle data security policies and a pseudonym for the vehicle; requesting, by the cloud center device, an authentication center to generate a pseudonym certificate for the pseudonym and receiving the pseudonym certificate; transmitting, by the cloud center device, the cloud-based vehicle data security policies, the pseudonym, and the pseudonym certificate to the vehicle; generating, by the vehicle, vehicle state information, including accident record information and driving entity information, based on the cloud-based vehicle data security policies and transmitting the same to the cloud center device; and storing, by the cloud center device, the accident record information and the driving entity information in a database for each vehicle.

VISUAL SENSOR VALIDATION SYSTEM

Technology descried here can be used for collecting information about malicious attacks on computer devices. Hosting hardware can be configured to host virtual machines, virtual machines of ECU images, and ECUs to collect records of malicious attacks. An attack analyzer can generate fingerprints from the malicious attacks.

Method and apparatus for determining a propagation delay and/or a distance between multiple transceivers, particularly for a vehicle-entry and/or starting system

A method and apparatus for determining a propagation delay and/or a distance between a plurality of transceivers, in particular between transceivers outside and/or as part of a motor vehicle, wherein the transceivers are each designed: to generate identical codes in a plurality of these transceivers, using a calculation method known to them, from at least one starting value transmitted, in particular, from one of the transceivers to the further transceivers, to transmit one or more messages from at least one of the transceivers to one or more further ones of the transceivers, which messages each contain at least one of the codes, to determine at least one propagation delay and/or at least one distance between at least two of the transceivers, in particular from the propagation delay and/or transmission times of the one or more messages.

Control device, computer readable recording medium recording program for control device, and control method
11338768 · 2022-05-24 · ·

A control device includes a communication unit configured to acquire control information on a vehicle from an information processing device in a wired or wireless communication, and a processing unit configured to execute a process of starting vehicle control based on the control information. The processing unit continues or suspends the process of starting vehicle control depending on a result of an authentication process on usage authority of the control information, and the authentication process is executed while the process of starting vehicle control is executed.

Digital keys and systems for preventing relay attacks

Computer systems for training a machine learning model for preventing relay attacks. Including portable electronic devices capable of controlling the opening or closing, contactlessly, of an access to a road vehicle on the basis of a pretrained machine learning model. The general principle is based on the use of smartphones as a digital key for accessing a road vehicle. Machine learning is used to train a learning model capable of predicting the movement of a smartphone of this type as it approaches or moves away from the road vehicle. Subsequently, access to the road vehicle is authorized only when same receives the information on the movement of the smartphone.

Onboard vehicle digital identification transmission

A computer-implemented method includes: establishing a connection between a user device of a user and a system onboard a vehicle being driven by the user; requesting access, through the established connection, to user information on the user device; in response to a grant of access, retrieving at least a portion of the user information from the user device, the portion of user information including a digital identification document of the user that had been issued by an entity after having vetted the user, the digital identification document including a digital biometric of the user as well as a digital watermark indicating the issuing entity; and retaining, on the system onboard the vehicle, data encoding the digital identification document of the user on the vehicle such that when the vehicle is inspected by a third-party agent, the digital identification document of the user is presented to the third-party agent.

System for method for secured logging of events

A system for secured logging of a second event. The system includes a logging device and a triggering device The triggering device receives an input related to the second event, creates second event message based on received input related to the second event, and receives the first set of data related to first logged event from the logging device. The triggering device further creates a first position-lock data from the first set of data, creates a second append request, and provides the second append request to the logging device. The logging device is configured to verify the second append request. Based on positive verification, the logging device creates a logging device signature over a second log-append-approval, and combines the created logging device signature with the provided second append request to form a second logged event.