Patent classifications
H04L2209/84
Secure wireless lock-actuation exchange
System and techniques for a secure wireless lock-actuation exchange are described herein. After receiving a request to actuate a lock from a device, a controller can calculate a challenge counter and then perform verification iterations until an end condition is met—which is a failure of a verification iterations or the number of iterations reaches the challenge count. If the verification iterations reach the challenge count (e.g., there are no failed iterations), then the controller actuates the lock. Each iteration includes an exchange between the device and the controller that the device validates by signing a message with a private key shared by the device and the controller. The exchange also includes a freshness value integrated into the device validation to prevent replay attacks.
Verifying software malfunction sources among disparate code sources
Disclosed herein are techniques for identifying sources of software-based malfunctions. Techniques include identifying a potential software malfunction in a system, the system having multiple code sets associated with a plurality of different software sources; accessing a line-of-code behavior and relation model representing execution of functions of the code sets; identifying, based on the line-of-code behavior and relation model, a code set determined to have the potential to cause, a least in part, the potential software malfunction; and determining a source identifier of the identified code set.
Selective real-time cryptography in a vehicle communication network
A sender device includes: a first sequence generator configured to generate a first sequence of bits having a bit pattern that incudes first bit values and second bit values; a first parsing processor configured to receive a first plurality of data blocks and the first sequence of bits, and select a first subset of data blocks and a second subset of data blocks from the first plurality of data blocks based on the bit pattern; an encryption processor configured to encrypt the selected first subset of data blocks received from the first parsing processor to generate encrypted data blocks and output the encrypted data blocks to an output terminal that is configured to output the encrypted data blocks and the selected second subset of data blocks as unencrypted data blocks from the sender device.
Tracking of transport transfers
An example operation may include one or more of sending, by a transport, a drop off request to a plurality of nodes at a target location, receiving, by the transport, permissions from the plurality of the nodes, responsive to the permissions, acquiring, by the transport, an agreement for the drop off request from at least one node from the plurality of the nodes, and recording the drop off request on a remote storage.
METHODS AND SYSTEMS FOR INFORMING DRIVERS OF VEHICLE OPERATING FUNCTIONS
A method including identifying a user of a selected vehicle, determining a customary vehicle of the user based on the identification, determining differences between the selected vehicle and the customary vehicle, and informing the user of the determined differences.
Safety of transport maneuvering
An example operation includes one or more of detecting, by a processor of a transport, an exit on a road, calculating, by the processor of the transport, a probability that the transport is not prepared to exit, requesting, by the processor of the transport, at least one other transport proximate to the transport to alter its speed if the probability exceeds a threshold, and responsive to a detecting of an altering of the speed by the at least one other transport, triggering the transport to exit the road.
Hardware security for an electronic control unit
An electronic control unit (ECU) for vehicles is described, including memory to store encrypted data and unencrypted data; a main control unit operatively connected to memory to access unencrypted data; and a hardware encryption-decryption device operatively connected to memory to access encrypted/decrypted data for decryption using a hardware algorithm and for encryption using a hardware algorithm. Data in the memory is decrypted by the hardware encryption-decryption device using the hardware algorithm and stored in memory for use by the main control unit. Data in memory is encrypted by the hardware encryption-decryption device using the hardware algorithm for storage in memory. The main control unit and the hardware encryption-decryption device are separate integrate circuits on a same substrate or and are connected by a bus and can process data in parallel. An external bus can communicate encrypted information with the ECU to allow encrypt/decrypt at run time (on-the-fly) and wire-speed.
Vehicle location correction using roadside devices
A system comprises a computer including a processor and a memory. The memory storing instructions executable by the processor to cause the processor to detect a roadside device via at least one vehicle sensor of a plurality of vehicle sensors; determine a location of a vehicle based on a fixed location of the roadside device; determine a location correction adjustment, wherein the location correction adjustment comprises a difference between an assumed location of the vehicle and the determined location of the vehicle, wherein the assumed location is obtained from a navigation system of the vehicle; and adjust the assumed location based on the location correction adjustment.
System and associated methods for remote control of vessels
A machine and process for remotely controlling a vessel. The system may include a land-based computing system configured to communicate control signals via a communications system that communicates the control signals to the vessel and a controller network on the vessel configured to control at least certain functions of the vessel. The controller network may further be configured to receive the control signals from the land-based computing system. The controller may include a switch including an input port and multiple output ports. A remote control computing device may be configured to control the vessel via at least one other computing device. A one-way Ethernet cable may be communicatively coupled between one of the output ports of the switch and the remote control computing device. The control signals may be received by the switch being communicated to the remote control computing device via the one-way Ethernet cable.
Dynamic CFI using line-of-code behavior and relation models
Disclosed herein are techniques for analyzing control-flow integrity based on functional line-of-code behavior and relation models. Techniques include receiving data based on runtime operations of a controller; constructing a line-of-code behavior and relation model representing execution of functions on the controller based on the received data; constructing, based on the line-of-code behavioral and relation model, a dynamic control flow integrity model configured for the controller to enforce in real-time; and deploying the dynamic control flow integrity model to the controller.