Patent classifications
H04L2209/84
Distributed ledger systems for modular vehicles
The disclosure is directed to, among other things, distributed ledger systems for modular vehicles. The disclosure may involve receiving, at a first ledger associated with a first node, information regarding an interaction between the first node and a second node. The same transaction information may also be received at a second ledger associated with the second node, as well as ledgers associated with any other number of nodes. The first node, second node, and any other number of nodes may be modular vehicle components. Additionally, the first ledger, second ledger, and any other number of ledgers include a set of the same information. The first node, second node, and third node may be nodes on a distributed ledger network.
Determining an Environmental Parameter From Sensor Data of a Plurality of Automobiles Using a Cellular Network
A computer server receives sensor data via a cellular wireless network from each of a plurality of automobiles in a geographical area. In each automobile of the plurality of automobiles the sensor data is received from sensors located in the respective automobile. The sensor data of the respective automobile may include a time stamp of the sensor data and at least one parameter of an external environment of the respective automobile. The computer server may further determine an external environmental parameter of the geographical area based on the sensor data received from the plurality of automobiles in the geographical area via the cellular wireless network. The external environmental parameter relates to the external environment of the plurality of automobiles in the geographical area. The computer server may transmit the external environmental parameter to multiple automobiles of the plurality of automobiles.
METHOD AND SYSTEM FOR REDUCED V2X RECEIVER PROCESSING LOAD USING NETWORK BASED APPLICATION LAYER MESSAGE PROCESSING
A method at a network element for processing a first message destined for an intelligent transportation system station, the method including receiving from a sending entity, or generating, the first message at the network element; based on a source or contents of the first message, performing one of: discarding the first message; or modifying the first message to provide an indication to the intelligent transportation system station of checks the intelligent transportation system does not need to perform, thereby creating a second message; and forwarding the second message to the intelligent transportation system station.
METHOD FOR CREATING AND MAINTAINING A DISTRIBUTED LEDGER OF VEHICLE GAS CONSUMPTION AND WEAR AND TEAR INFORMATION
A distributed ledger operated by a group of network participants according to a set of consensus rules stores vehicle condition data and generated vehicle condition reports. The vehicle condition data may be received directly from a vehicle or an associated mobile device and the vehicle condition report may be accessed by an authorized user.
Connected vehicle communication with improved misbehavior processing
A form of the invention is applicable for use in conjunction with a security credential management system that produces and manages pseudonym digital certificates issued to vehicles and used by vehicles to establish trust in vehicle-to-vehicle communications, the security credential management system including a pseudonym certificate authority processor entity which issues pseudonym digital certificates to vehicles, a registration authority processor entity that validates, processes and forwards requests for pseudonym digital certificates to the pseudonym certificate authority processor entity, and a misbehavior authority processor entity that receives misbehavior reports from reporter vehicles that include information about the reporter vehicles and suspect misbehaving vehicles and is responsible for producing a list of revoked credentials; the pseudonym certificate processor entity and registration authority processor entity participating in producing linkage values to be contained within the issued pseudonym digital certificates, the linkage values being derived ultimately, using a one-way function, from linkage seeds thereby enabling, in predetermined circumstances, at least some of the certificates containing linkage values derived from a given linkage seed to be revoked. A method is set forth for improving operation of the security credential management system, including the following steps: in conjunction with deriving the linkage values from the linkage seeds, additionally producing encrypted linkage maps that relate, in encrypted form, linkage values with linkage seeds from which they are derived; determining particular linkage values deemed to be of interest based at least in part on information derived from misbehavior reports; and determining linkage seeds associated with the particular linkage values utilizing decryptions of the encrypted linkage maps.
Remote loading dock authorization systems and methods
Systems and methods for monitoring components of a loading dock station that implement a remote monitoring and authorization system are disclosed. The systems and methods can provide information regarding the status of various components of the loading dock station to a remote monitoring and authorization control unit, where a supervisor or the like is capable of reviewing real time information regarding the status of the components and progress through and adherence to a workflow protocol. The systems and methods can also provide for authorization requests to be sent to the remote monitoring and authorization control unit, such as requests to override certain components of the docking station. The user at the remote monitoring and authorization control unit can then grant or deny requests based on status information and other data provided at the remote monitoring and authorization control unit.
Automated authentication systems and methods including automated waste management system with automated weight ticket and authentication
Disclosed and described herein are systems and methods that bring together edge technologies into a single, streamlined process that automates the tracking and usage of assets (containers, equipment, mobile storage, etc.). These systems and methods include the use of smart beacons, low power cellular, sensors (strain gauges, level, contact, ohm/voltage, etc.), voice, video, microcontroller advancements, and the like. Conventional systems that have electronic service order and/or tickets are still limited in their functionality because of data, communication and processing hurdles. Disclosed are modern electronic data capture systems (IoT sensors) along with algorithms to assist on the tracking of assets and workers, more quickly capture authorized transactions for billing and remove the manual processes.
Visualization of code execution through line-of-code behavior and relation models
Disclosed herein are techniques for visualizing and configuring controller function sequences. Techniques include identifying at least one executable code segment associated with a controller; analyzing the at least one executable code segment to determine at least one function and at least one functional relationship associated with the at least one code segment; constructing, a software functionality line-of-code behavior and relation model visually depicting the determined at least one function and at least one functional relationship; displaying the software functionality line-of-code behavior and relation model at a user interface; receiving a first input at the interface; in response to the received first input, animating the line-of-code behavior and relation model to visually depict execution of the at least one executable code segment on the controller; receiving a second input at the interface; and in response to the received second input, animating an update to the line-of-code behavior and relation model.
Systematic integration via an intrusion detection device
A vehicle theft-prevention apparatus can include at least one computing device couple to a plurality of sensors and a wireless transceiver. The plurality of sensors can be configured to sense measurements proximate to a vehicle. The at least one computing device can be configured to read a plurality of first measurements of a first sensor of the plurality of sensors. Based on the plurality of first measurements from the first sensor, the at least one computing device can determine that a key fob moved outside of a range of the first sensor. In response to the key fob moving outside of the range of the first sensor, the at least one computing device can transition to an armed state. The at least one computing device can read a plurality of second measurements from a subset of the plurality of sensors. Based on the plurality of second measurements, the at least one computing device can determine that a person has entered the vehicle.
Method and system for establishing trust for a cybersecurity posture of a V2X entity
A method at an Intelligent Transportation System (ITS) Transmitting Entity, the method including: generating an ITS message; augmenting the ITS message with an Integrity Report generated by an integrity detection function at the ITS Transmitting Entity to create an augmented ITS message; signing the augmented ITS message with an Authorization Certificate or Ticket, the Authorization Certificate or Ticket including an assurance indication from an Audit Certificate Authority for the integrity detection function; and sending the signed, augmented ITS message to an ITS Receiving Entity.