Patent classifications
H04L2209/84
Using a Distributed Ledger for Line Item Determination
Systems and methods are disclosed with respect to using a blockchain for managing the subrogation claim process related to a vehicle collision, and in particular, determining responsibility to pay for line items as part of the subrogation process. In one embodiment, the systems and methods may include (1) receiving a transaction from at least one other participant in the distributed ledger network; (2) analyzing the transaction to determine a set of line items related to a subrogation claim; (3) comparing the set of line items to a baseline dataset; (4) generating a transaction including a disputed line items dataset; and (5) transmitting the transaction to a smart contract stored on the distributed ledger.
METHOD AND SYSTEM FOR HANDLING DYNAMIC CYBERSECURITY POSTURE OF A V2X ENTITY
A method at a network element, the method including receiving at least one message at the network element, the at least one message being one or both of: an update status information message from an updates server; and an anomaly detection status information message from anomaly detection server; determining, based on the receiving the at least one message, a dynamic cybersecurity posture indication for an intelligent transportation system entity; and providing the dynamic cybersecurity posture indication for the intelligent transportation system entity to an Enrolment Authority, wherein the dynamic cybersecurity posture indication can be included in a certificate relating to the intelligent transportation system entity.
METHOD AND SYSTEM FOR ESTABLISHING TRUST FOR A CYBERSECURITY POSTURE OF A V2X ENTITY
A method at an Intelligent Transportation System (ITS) Transmitting Entity, the method including: generating an ITS message; augmenting the ITS message with an Integrity Report generated by an integrity detection function at the ITS Transmitting Entity to create an augmented ITS message; signing the augmented ITS message with an Authorization Certificate or Ticket, the Authorization Certificate or Ticket including an assurance indication from an Audit Certificate Authority for the integrity detection function; and sending the signed, augmented ITS message to an ITS Receiving Entity.
Determining a change to product information or user information via hashing
A device may determine a price of a product based on first information concerning attributes of the product, and provide the price for display by a user device. The device may generate first hash values based on the first information, where a particular first hash value is associated with a particular attribute, and generate a first bit-string that includes the plurality of first hash values. The device may generate second hash values based on second information concerning the attributes of the product, where a particular second hash value is associated with the particular attribute. The device may generate a second bit-string that includes the second hash values, and determine a change to the particular attribute based on the first bit-string and the second bit-string. The device may determine a new price of the product based on the change, and provide the new price for display by the user device.
Systems and methods for a butterfly key exchange program
Embodiments described herein provide an implicit protocol with improved resource and bandwidth efficiency. A post-quantum secure approach for issuing multiple pseudonym certificates from a small piece of information is provided, while traditionally most encryption schemes are vulnerable to post-quantum attacks (e.g., in a traditional SCMS). Long-term security can be improved with the post-quantum protocol.
Systems and methods for authenticating image data
A system may include an imaging system coupled to a host subsystem. The imaging system may include an image sensor that provides image frames to the host subsystem. The image sensor may include a data authentication subsystem that appends corresponding authentication data to each of the image frames. Each set of authentication data may be generated based on a subset of the image frame data (e.g., corresponding to image data generated by pixels defined by a sparse region-of-interest within the pixel array). The host subsystem may securely provide region-of-interest parameters to the image sensor to update the sparse region-of-interest in an adaptive manner to account for factors such as computational load of the host subsystem and authentication coverage for the entire pixel array.
Transport gait and gesture interpretation
An example operation includes one or more of receiving, by a computer associated with a transport, a gait of an individual from at least one camera associated with the transport, validating, by the computer, the gait, receiving, by the computer, a gesture of the individual from the at least one camera, validating, by the computer, the gesture, and performing, by the computer, one or more functions based on the validated gait and the validated gesture.
AUTOMATED AUTHENTICATION SYSTEMS AND METHODS INCLUDING AUTOMATED WASTE MANAGEMENT SYSTEM WITH AUTOMATED WEIGHT TICKET AND AUTHENTICATION
Disclosed and described herein are systems and methods that bring together edge technologies into a single, streamlined process that automates the tracking and usage of assets (containers, equipment, mobile storage, etc.). These systems and methods include the use of smart beacons, low power cellular, sensors (strain gauges, level, contact, ohm/voltage, etc.), voice, video, microcontroller advancements, and the like. Conventional systems that have electronic service order and/or tickets are still limited in their functionality because of data, communication and processing hurdles. Disclosed are modern electronic data capture systems (IoT sensors) along with algorithms to assist on the tracking of assets and workers, more quickly capture authorized transactions for billing and remove the manual processes.
COMMUNICATING SECURELY WITH DEVICES IN A DISTRIBUTED CONTROL SYSTEM
A method comprises a server generating a server nonce and transmitting a server public key, a key signature and the server nonce to a device, the device verifying the server public key, signing the server nonce with a device private key, generating a device nonce, and transmitting the server nonce, the server nonce signature, a device public key, a device key signature, and the device nonce to the server, the server verifying the server nonce and the device public key, generating a session key, encrypting the session key with the device public key, signing the device nonce and the session key with a server private key, and transmitting the device nonce, the signed device nonce and session key, and the encrypted session key to the device, and the device verifying the device nonce, decrypting the encrypted session key with the device private key, and verifying the decrypted session key.
Methods and Apparatuses for Secure Communication Between a First and a Second Communication Partner
Methods and apparatuses for secure communication between a first and a second communication partner are provided. The method for secure communication between a first and a second communication partner comprises establishing a communication link between the first and the second communication partner. Further, the method comprises determining one or more session identifiers by one of the first and the second communication partner. The method additionally comprises communicating the one or more session identifiers to the other of the first and the second communication partner. The method comprises determining, for each of the one or more session identifiers, a respective symmetric session key in each of the first and the second communication partner. In addition, the method comprises storing the one or more session identifiers and the corresponding symmetric session keys in each of the first and the second communication partner for one or more subsequent secure communication sessions.