H04L2209/84

Secure tunneling for connected application security

A computing platform of a vehicle may receive a request, from a mobile application accessing a secure vehicle function, to create a secure tunnel between the computing platform and the mobile device; retrieve an application certificate from the mobile application; and validate the creation of the secure tunnel using the application certificate and a module certificate from a local policy table of the computing platform. A mobile device, connected to a computing platform of a vehicle may execute a mobile application requiring a secure vehicle function; send a request to create a secure tunnel with the computing platform responsive to access of by the mobile application of the secure vehicle function; and send to the computing platform an application certificate corresponding to the mobile application to validate creation of the secure tunnel.

In-vehicle network system

An in-vehicle network system includes one first node and a plurality of second nodes. The first node is configured to transmit predetermined data to the respective second nodes, and transmit verification data for verifying whether the predetermined data has been normally received by the second nodes to the second nodes when the predetermined data has been transmitted to the second node. Each of the second nodes is configured to receive the predetermined data transmitted from the first node, receive the verification data transmitted from the first node, verify whether the received predetermined data has been normally received based on the received predetermined data and the received verification data, and transmit a verification result to the first node.

CENTRALIZED CONTROLLER MANAGEMENT AND ANOMALY DETECTION

In one implementation, a method for providing security on externally connected controllers includes receiving, at a server system, operation information for a plurality of instances of a controller, the plurality of instances being installed across a plurality of devices; statistically analyzing, by the server system, the operation information; identifying, by the server system, one or more anomalous controller behaviors based on the statistical analysis; and providing, by the server system, information regarding the one or more anomalous controller behaviors on the controller as potential security threats.

Car sharing system

The car sharing system includes a car share device and an encryption code updating unit. The car share device is configured to perform wireless communicate with a mobile terminal that is operable as a vehicle key. The encryption code updating unit updates a first encryption code, which was used during a previous connection of the mobile terminal and the car share device, to a second encryption code, which differs from the first encryption code, when the mobile terminal and the car share device are reconnected.

HARDWARE COUNTERMEASURES IN A FAULT TOLERANT SECURITY ARCHITECTURE
20210357536 · 2021-11-18 ·

A system-on-chip (SoC) is provided that includes security control registers, the security control registers including security flags for security critical assets of the SoC, wherein each security flag includes multiple bits.

CERTIFICATE-BASED PAIRING OF KEY FOB DEVICE AND CONTROL UNIT
20220009444 · 2022-01-13 ·

An electronic device, in disclosed embodiments, includes an antenna, transceiver circuitry coupled to the antenna, a memory configured to store a first operation key and instructions, and a processor coupled to the transceiver and to the memory. The processor is configured to execute the instructions stored in the memory to cause the electronic device to, in response to receiving a first transmission containing an encrypted version of a second operation key that is encrypted by the first operation key, decrypt the encrypted version of the second operation key using the first operation key to recover the second operation key, store the second operation key in the memory, transmitting, by a transmitter of the electronic device, a second transmission that contains the first operation key and a command.

Exchanging Cryptographic Key Information
20210359847 · 2021-11-18 · ·

A computer-implemented method is provided for exchanging cryptographic key information between a device and a central point comprises obtaining a cryptographic secret, wherein the cryptographic secret is known to the central point. The method furthermore comprises obtaining a public key of the central point. The method furthermore comprises generating a cryptographic key pair for the device with a private key of the device and a public key of the device. The method furthermore comprises signing the cryptographic secret with the private key of the device. The method furthermore comprises encrypting the cryptographic secret signed with the private key of the device with the public key of the central point. The method furthermore comprises providing the encrypted and signed cryptographic secret, an address of an electronic mailbox of the device, and the public key of the device for the central point via an electronic mailbox of the central point.

METHOD FOR FLIGHT DATA RECORDING OF UNMANNED AERIAL VEHICLE USING BLOCKCHAIN TECHNOLOGY AND APPARATUS FOR THE SAME
20210354855 · 2021-11-18 ·

Disclosed herein is a method for recording flight data of an unmanned aerial vehicle (UAV) using blockchain technology. The method includes collecting sensor data from a sensor installed in the UAV, collecting location information of the UAV from a GPS installed therein, estimating the flight status of the UAV based on a control signal, the sensor data, and the location information, detecting an abnormal condition by comparing the flight status with the flight plan of the UAV, generating signature information corresponding to surroundings at a corresponding time based on peripheral signals collected from a receiver installed in the UAV, generating a transmission data block capable of being registered in a blockchain based on the flight status, the abnormal condition, and the signature information, transmitting the transmission data block to a flight data registration apparatus, and registering the transmission data block, received by the flight data registration apparatus, in the blockchain.

MULTIMODAL COMMUNICATION SYSTEM

A multimodal communication system includes a vehicle controller that controls one or more systems or subsystems of an unmanned vehicle. The communication controller manages communication and logical access to the unmanned vehicle. One or more sensors in communication with the communication controller detects and measures physical properties in proximity to the unmanned vehicle. Transceivers receive the unmanned vehicle commands that are transmitted simultaneously or concurrently and a monotonic generator generates a monotonic object each time the unmanned vehicle's operating state changes. The communication controller executes the first unmanned vehicle command received that has the correct cryptographic hash validating knowledge of the unmanned vehicle's current operating state.

METHOD BY WHICH DEVICE SHARES DIGITAL KEY

Provided is a method of sharing a digital key between devices, and a method, performed by an owner device, of transmitting a digital key to a target device, includes: transmitting digital key configuration data; receiving a digital key attestation including a public key of the target device, the digital key configuration data, and a signature of the target device; generating a digital key sharing attestation including the public key of the target device, the digital key configuration data, the signature of the target device, and a signature of the owner device; and transmitting the digital key sharing attestation.