H04L2209/84

Digital access system for vehicles for externally controlled loading processes

The invention relates to a digital access system (1), an electric vehicle (100) with such an access system and a method (200) for granting an access authorization to an electric vehicle with such an access system, comprising an unlocking unit (11) for positioning in the vehicle (100), at least one access unit (12) and at least one activation unit (13) for use outside the vehicle (100), wherein the activation unit (13) activates the unlocking unit (11) by means of wireless data communication (21) to the unlocking unit (11) at least for a period, the access unit (12) arranging access arranging access to the vehicle (100) from the outside by means of an independent wireless data communication (22) separate to the previous data communication (21) with the previously activated receiving unit (11), wherein the unlocking unit (11) transmits control signals (14) to the system controller (110) in response to the data communication (22) with the access unit (12) for controlling the locking system and activating at least one locking component (140) for allowing access to the vehicle to its loading.

Apparatus for configuring and validating an intervention in a real-time ethernet data network
11764997 · 2023-09-19 · ·

An apparatus for configuring and validating an intervention in a real-time Ethernet data network for a motor vehicle includes: a vehicle diagnostic device, a first data storage device, a first data checking device, a second data storage device, and a second data checking device.

Control of a Motor Vehicle
20220030426 · 2022-01-27 ·

A motor vehicle stores a first one-way hash of a password and an encrypted value from a second one-way hash of the password. A method for authenticating a device with respect to the vehicle includes the following: a PACE procedure is carried out so that the device and the motor vehicle determine the same session key; the motor vehicle generates a communication key on the basis of the session key and the encrypted one-way hash; and the device generates the communication key based on the session key and the second one-way hash.

IN-VEHICLE MEDIA CONTENT MONITORING AND REPORT GENERATION

The invention provides a novel and unique system and method for cross channel in-vehicle identification of media, source, and consumption measurement and analysis. Real-time measurement and analysis of all applicable forms of media that a driver or passenger may consume inside of an automobile can be achieved. This includes AM/FM radio, Satellite Digital Audio Radio Service (SDARS), stored media such as CDs, MP3s & DVDs, streaming media, internet radio, audio books, podcasts, text-to-speech content, use of hands-free calling and other forms of audio, including content routed to the In Vehicle Entertainment (IVE) system through integration with a smartphone, media player or similar external Consumer Electronic (CE) device via wired or wireless connectivity, including but not limited to USB, Bluetooth, Wi-Fi, and the like, and also including integration platforms such as APPLE CARPLAY, GOOGLE ANDROID AUTO, HARMAN AHA RADIO, PANASONIC AUPEO, PIONEER ZYPR, FORD SYNC, MIRRORLINK, AIRBIQUITY CHOREO, and the like.

ACCESS MANAGEMENT SYSTEM, AUTHENTICATION DEVICE FOR ACCESS MANAGEMENT SYSTEM, MANAGEMENT DEVICE FOR ACCESS MANAGEMENT SYSTEM, PORTABLE TERMINAL FOR ACCESS MANAGEMENT SYSTEM, MOBILE BODY FOR ACCESS MANAGEMENT SYSTEM, DATA STRUCTURE FOR ACCESS MANAGEMENT DATA, ACCESS MANAGEMENT PROGRAM, AND CONSTRUCTION METHOD FOR ACCESS MANAGEMENT SYSTEM
20220027448 · 2022-01-27 · ·

An access management system that reduces possibility of unauthorized access, an authentication device, a management device, a portable terminal, and a mobile body configuring the access management system, a data structure for access management data used in the access management system, an access management program executed in the access management system, and a construction method for the access management system. A plurality of nodes connected by a P2P network share a blockchain. Authentication conditions are recorded in blocks of the blockchain by a management node, which is any one of the plurality of nodes. The authentication conditions include authentication information. The authentication conditions designate an authentication node, which is any one of the plurality of nodes, as a node that performs authentication. The passing body is authenticated by the authentication node.

TECHNIQUES FOR MANAGING DATA DISTRIBUTION IN A V2X ENVIRONMENT

Techniques described herein include utilizing a mobile device as a proxy receiver and/or transmitter for a vehicle in a V2X network. In some embodiments, the mobile device associated mobile device capabilities may be configured to obtain vehicle capabilities and store such data in memory at the mobile device. The mobile device may obtain any suitable combination of a reception credential and one or more transmission credentials. In some embodiments, the one or more transmission credentials may be generated by a credential authority based at least in part on determining that the vehicle capabilities and mobile device capabilities indicate that the sensor(s) and/or processing resources of the vehicle and/or mobile device meet transmission requirement thresholds for the network. The mobile device may subsequently transmit any suitable data message on behalf of the vehicle using at least one of the transmission credentials.

Trusted device establishment
11190507 · 2021-11-30 · ·

A device implementing a trusted device establishment system includes at least one processor configured to receive, via a direct wireless connection and from an other device, a public key associated with the other device and an indication of a data item previously provided to the other device via an out-of-band channel. The at least one processor is further configured to verify that the indication of the data item corresponds to the data item previously provided to the other device, and store, in a secure memory region, the public key in association with an identifier corresponding to the other device when the indication of the data item is verified. The at least one processor is further configured to authorize the public key to access a secure device based at least in part on the public key being stored in the secure memory region.

AUTHORIZING FUNCTIONALITY OF A TRANSPORT COMPONENT
20220024423 · 2022-01-27 ·

An example operation includes one or more of detecting, by a component in a transport, that another component has been removed, detecting, by the component, that a replacement component has been added in the transport, providing, by the component, data to the replacement component, wherein the data attempts to subvert an authorized functionality of the replacement component, and responsive to a non-subversion of the authorized functionality, permitting, by the component, use of the authorized functionality of the replacement component.

Single node network connectivity for structure automation functionality

Facilitating single node network connectivity for structure automation functionality is provided herein. A system can comprise a memory that stores executable components and a processor, operatively coupled to the memory, that executes the executable components. The executable components can comprise a management component that facilitates a communication with electronic devices within a structure and an initialization component that enables a streamlined security process based on an indication that the at least one electronic device is to be registered with the management component. Further, the executable components can comprise a negotiation component that performs a certificate authentication for the at least one electronic device. The certificate authentication can be automatically performed with a certificate authority during a backend process.

METHOD OF AND SYSTEM FOR SECURE DATA EXPORT FROM AN AUTOMOTIVE ENGINE CONTROL UNIT

A method of secure data export from an automotive ECU to a requesting entity includes receiving a signed request, the request transmitting a first public encryption key. The signature is verified using a second public key stored in the automotive ECU. Further, the requesting entity is authenticated. Only upon successful verification and authentication the automotive ECU generates a random symmetric key for encrypting the data to be exported. The symmetric key is encrypted using the first public key received in the request, and unencrypted data is deleted. The encrypted data is exported to the requesting entity, which decrypts the symmetric key using a first private key associated with the first public key, and decrypts the data encrypted with the symmetric key.