H04L2209/84

Programmable device key provisioning

The present disclosure provides systems and methods for improving provision of secret data on programmable devices. An appliance receives physical unclonable function (PUF) data pertaining to an integrated circuit. Secret data is provided to the appliance from a secret vault. Public and private PUF keys are derived based upon the PUF data. Further, ephemeral public and private keys are derived by the appliance. The public and private PUF keys, along with the ephemeral public and private keys are used to establish a secure channel for programming the secret data on the programmable device.

Computer-implemented method for connecting a vehicle to a wireless local network of a workshop
20230262461 · 2023-08-17 ·

A computer-implemented method for connecting a vehicle to a wireless local network of a workshop includes identifying at least one wireless local network configuration of the wireless local network, said wireless local network configuration being associated with credentials for using said wireless local network; associating at least one validity parameter to said credentials in order to allow limited accessibility for the vehicle to said wireless local network; generating an encrypted visual representation of said credentials, thereby enabling the generated encrypted visual representation to be presented to a camera of the vehicle and decrypted to obtain said credentials; upon receipt of a connection request including the credentials from the vehicle, checking the at least one validity parameter to determine that the credentials are still valid for the vehicle; and upon determination that the credentials are still valid, allowing the vehicle to connect to the wireless local network of the workshop.

COMPUTER-IMPLEMENTED METHOD FOR CONNECTING A VEHICLE TO A WIRELESS LOCAL NETWORK OF A WORKSHOP
20230262462 · 2023-08-17 ·

The invention relates to a computer-implemented method for connecting a vehicle to a wireless local network of a workshop, comprising: identifying at least one wireless local network configuration of the wireless local network, said wireless local network configuration being associated with credentials for using said wireless local network, associating at least one validity parameter to said credentials in order to allow limited accessibility for the vehicle to said wireless local network, sending to a remote server said credentials, thereby enabling said credentials to be provided to the vehicle, upon receipt of a connection request including the credentials from the vehicle, checking the at least one validity parameter to determine that the credentials are still valid for the vehicle, and upon determination that the credentials are still valid, allowing the vehicle to connect to the wireless local network of the workshop.

Systems and methods for centrally managed host and network firewall services

Systems and methods for a unified, cloud-managed platform for controlling enterprise network security are provided. According to one embodiment, a network of an enterprise is protected by a cloud-managed platform. An underlying architecture of the cloud-managed platform is abstracted by providing a portal through which modifications to security policies are expressed as business requirements of the enterprise. The security policies are automatically enforced regardless of location or endpoint. A policy digest, including information regarding the modifications and formatted according to a predefined format, generated and locally queued by the portal is retrieved. Security enforcement systems associated with the cloud-managed platform are configured to control communications to and from the network according to the security policies by generating API calls to the security enforcement systems and agents running on endpoints associated with the network are configured to control endpoint-to-endpoint connections according to the security policies based on the policy digest.

Validating an electronic control unit of a vehicle

The present disclosure includes apparatuses, methods, and systems for validating an electronic control unit of a vehicle. An embodiment includes a memory, and circuitry configured to generate a run-time cryptographic hash based on an identification (ID) number of an electronic control unit of a vehicle and compare the run-time cryptographic hash with a cryptographic hash stored in a portion of the memory.

Vehicle digital key sharing service method and system
11330429 · 2022-05-10 · ·

The present invention relates to a vehicle digital key sharing service method. The vehicle digital key sharing service method according to one embodiment includes a digital registration step in which a management server generates a terminal digital key and a vehicle digital key after user authentication in response to a digital key registration request through a dedicated application of a mobile terminal and the mobile terminal stores the terminal digital key in a secure world that is separated from a normal world and a digital key using step in which an authentication token is generated using the terminal digital key stored in the secure world when the mobile terminal approaches or tags a vehicle and a vehicle device locks or unlocks a door of the vehicle by activating the vehicle digital key, which is registered from the management server, to validate the authentication token.

System and method for secure authentication and authorization
11329820 · 2022-05-10 · ·

Embodiments herein relate to system and method for secure authentication and authorization between a user device and an Internet of Things (IoT) device that is associated with an asset. The method includes onboarding, using a centralized computing device having one or more processors that are operatively associated with a distributed ledger, the user device with a user at least based on a public key identity of the user device; onboarding the user of the user device with the user device; onboarding an identity of the IoT device and the asset such that association between the asset and the IoT device is endorsed on the distributed ledger; and facilitating, through the centralized computing device, the user device to retrieve a first set of data packets representative of any of a relevant electronic authoritative document(s), associated consensus proof(s), and block header(s) from the distributed ledger.

AUTHENTICATING ELECTRONIC KEY DEVICES
20230256936 · 2023-08-17 ·

An example method may include receiving, from a key device, a first counter value and a first encoded counter value, identifying, among one or more mapping table entries in an access control unit mapping table, an access control unit mapping table entry specifying a second counter value that corresponds to the received first counter value, determining whether a second encoded counter value specified by the identified access control unit mapping table entry corresponds to the received first encoded counter value, and responsive to determining that the second encoded counter value corresponds to the received first encoded counter value, sending, to a control unit, an indication that permission is granted. The first encoded counter value may include a cryptographic encoding of the first counter value generated in view of a secret key.

AUTOMATICALLY VERIFYING VEHICLE IDENTITY AND VALIDATING VEHICLE PRESENCE

Systems, apparatuses and methods may provide for infrastructure node technology that conducts a mutual authentication with a vehicle and verifies, if the mutual authentication is successful, location information received from the vehicle. The infrastructure node technology may also send a token to the vehicle if the location information is verified, wherein the token includes an attestation that the vehicle was present in a location associated with the location information at a specified moment in time. Additionally, vehicle technology may conduct a mutual authentication with an infrastructure node and send, if the mutual authentication is successful, location information to the infrastructure node. The vehicle technology may also receive a token from the infrastructure node.

System, method, and apparatus for secure telematics communication

A method includes receiving registration information regarding a telematics unit and a respective control system for a plurality of equipment pieces; receiving a seed from a control system of a first equipment piece via a telematics unit of the first equipment piece based on receiving a telematics session request by the control system of the first equipment piece; authenticating the telematics unit and the control system of the first equipment piece based on information included with the seed and the registration information; generating a first encrypted key and a second encrypted key based on the authentication; providing the first key to the telematics unit for the first equipment piece; and providing the second encrypted key to the control system of the first equipment piece via the telematics unit of the first equipment piece to establish a data communication channel.