Patent classifications
H04L2209/84
DYNAMIC KEY MANAGEMENT FOR TRANSPORT
An example operation includes one or more of creating, by a transport, a digital key when the transport is powered on, wherein the digital key relates to an identity of an occupant of the transport, creating, by the transport, a digital sub-key that is related to the digital key, using, by the transport, the digital key during processing of a first set of functions, and using, by the transport, the digital sub-key during processing of a second set of functions that are more critical than the first set of functions.
AUTOMATIC DETECTION AND VALIDATION OF TRANSPORT SERVICE
An example operation includes one or more of performing, by a transport, validation of a service that is utilized at a first time, in response to the validation at the first time, transferring, by the transport, a portion of a value related to the service, performing, by the transport, at least one other validation of the service that is utilized at a second time, wherein the second time is later than the first time, and in response to the at least one other validation at the second time, transferring, by the transport, a second portion of the value related to the service.
UWB SYSTEM
Disclosed is an ultra-wideband (UWB) system and, more particularly, a UWB system using UWB ranging factor definition. The UWB system using the UWB ranging factor definition includes a memory in which a UWB ranging factor definition program is embedded and a processor which executes the program, wherein the program predefines UWB ranging factors to define a scrambled timestamp sequence (STS) index, an encryption key, and a nonce.
VEHICLE LOCATION CORRECTION USING ROADSIDE DEVICES
A system comprises a computer including a processor and a memory. The memory storing instructions executable by the processor to cause the processor to detect a roadside device via at least one vehicle sensor of a plurality of vehicle sensors; determine a location of a vehicle based on a fixed location of the roadside device; determine a location correction adjustment, wherein the location correction adjustment comprises a difference between an assumed location of the vehicle and the determined location of the vehicle, wherein the assumed location is obtained from a navigation system of the vehicle; and adjust the assumed location based on the location correction adjustment.
Method and apparatus for finding and accessing an access station
A method for access control accepts a first data from a first mobile computing device of a first patron. The first data is representative of at least a certificate and represents an authorization for access. The method further provides the access in response to the first data, and makes a record in the first station. The record includes a second data representing the access and an identifying portion of the certificate. The method further provides, after the access, a third data to a second mobile computing device of any patron. The third data is deliverable by the second mobile computing device to the management system and is representative of the record. The method further accepts a fourth data that is representative of at least an acknowledgment of the record, and deletes the record from the first station in response to the fourth data.
CLOUD-BASED KEYLESS ENTRY SYSTEM
Systems and methods for cloud-based keyless entry are generally described. In some examples, a first number is received from a vehicle. A first computing device of the vehicle may be configured to control an electronic door lock. A first unlock code may be generated using the first number. In some examples, a notification is sent to a remote entry device associated with the vehicle. A response to the notification may be received from the remote entry device. In some examples, the first number may be retrieved from a messaging service based at least in part on the receiving the response to the notification. A second unlock code may be generated using the first number. A determination may be made that the first unlock code matches the second unlock code. An instruction may be sent to the first computing device, the instruction effective to cause unlock of the electronic door lock.
Dynamic co-operative arrays of electromagnetic markers for highly autonomous vehicle location and cryptographically secure transactions
A system that uses cooperative arrays of electromagnetic resonating markers in combination with a vehicle mounted resonating transceiver. Markers establish their position placement during a calibration sequence in which cryptographic keys are exchanged, ensuring the markers are placed by authorized personnel and that none can be removed/relocated without detection. Markers can then be reliably polled by passing vehicles to determine relative location in areas of sensor occlusion. The markers can also be securely used for emerging smart city financial transactions such as automated parking, garbage collection, deliveries, tolling or temporary pedestrian markets.
System for facilitating secure communication in system-on-chips
A system to facilitate communication of a critical signal between functional circuitries of a system-on-chip utilizes a dynamic pattern to securely communicate the critical signal. The system includes selection and comparison circuits. The selection circuit is configured to select and output a set of dynamic pattern bits or a set of fixed reference bits, based on a logic state of the critical signal that is received from one functional circuitry. The comparison circuit is configured to output an output signal based on the set of dynamic pattern bits, and a set of intermediate bits that is derived from the set of dynamic pattern bits or the set of fixed reference bits. The output signal is provided to the other functional circuitry when a logic state of the output signal matches the logic state of the critical signal, thereby securely communicating the critical signal to the other functional circuitry.
Vehicle bus message authentication using watermarking
An electronic control unit comprises circuitry to receive a combined signal via a vehicle bus of a vehicle, wherein the combined signal contains a combination of a data signal and a watermark signal, which can be a radio frequency (RF) signal or an analog baseband signal, wherein the data signal includes a message, circuitry to extract a watermark from the watermark signal, circuitry to verify the watermark based on a comparison of the watermark with a pre-defined watermark, circuitry to extract the data signal from the combined signal and obtain the message from the data signal, and circuitry to authenticate the message based on the verification of the watermark.
PERFORMING SECURITY FUNCTIONS FOR AN IN-VEHICLE INTERNET OF THINGS (IOT) NETWORK
In some implementations, a device of an Internet of Things (IoT) network may receive, from a host associated with the IoT network, information associated with the IoT network. The device may store, via a memory controller of the device, the information in a memory with an embedded hardware security module of the device, wherein the device serves as a root of trust for the host using the information stored in the memory. The device may receive, from the host, a request to perform a security function. The device may perform, based on the request, the security function using the information stored in the memory. The device may generate an alert based on an outcome of the security function. Numerous other implementations are described.