Patent classifications
H04L2209/84
UWB SYSTEM
According to an aspect of the present invention, there is provided an ultra-wideband (UWB) system comprising: a memory in which a UWB ranging factor definition program is embedded; and a processor which executes the program, wherein the processor predefines UWB ranging factors to define a nonce in consideration of a unique key characteristic of an individual device.
METHOD AND APPARATUS FOR OPERATING A SECURE DATA COMMUNICATION BETWEEN FUNCTIONAL UNITS FOR A VEHICLE
A method for operating a data communication between functional units for a vehicle, in which a predefined number of data packets transmitted by a sending unit to a receiving unit is collected in a data buffer of the sending unit to generate a data block. In each predefined time step, one data packet is transmitted, in which the data packets are collected over a predefined collection period. A signature for authenticating the data block is then determined, the signature being determined over a predefined determination period lasting for multiple time steps. The signature is then sent in multiple parts from the sending unit to the receiving unit over a predefined transmission period, with one part of the signature being sent per time step. The sum of the collection period, the determination period and the transmission period is less than a predefined system fault tolerance time.
Vehicle system for sharing information among smart vehicles
A smart car system that exchanges information between different vehicles. An embodiment exchanges information one for the other. Another embodiment determines or sends information from one vehicle to the other, and then receives information from a different vehicle and keeps a score of a ratio between the amount of information that is set in an amount of information received. The information is checked for trust.
Securely transmitting commands to vehicle during assembly
A system includes a control module and a local server. The server is programmed to transmit a command to perform an operation to a plurality of vehicles including a vehicle including the control module. The command including a digital signature that is common across the vehicles. The control module is programmed to receive a temporary value; receive the command; decrypt the digital signature in the command with the temporary value; upon verifying the decrypted digital signature, perform the operation; and upon a metric incrementing to a threshold value, prevent decryption of the digital signature with the temporary value.
METHODS AND SYSTEMS FOR TRUSTED MANAGEMENT OF TRAFFIC VIOLATION DATA USING A DISTRIBUTED LEDGER
Disclosed herein are methods and systems for managing traffic violation or enforcement data using a distributed ledger. The distributed ledger provides a transparent chain of custody/evidence related to all digital interactions with traffic violation or enforcement data. The distributed ledger can be audited for data accuracy and integrity by nodes making up the system each time one of the nodes interacts with the traffic violation or enforcement data. For example, a digital evidence package related to a traffic violation event can be generated by a node within the system and a package digest can be logged in the distributed ledger beginning with the creation of the digital evidence package and each time that the digital evidence package is processed, modified, or reviewed by nodes within the system.
MULTI-PARTY COMPUTATION IN A COMPUTER SHARDING ENVIRONMENT
Methods and systems are presented for providing a framework for facilitating multi-party computation within a sharding environment. After a blockchain is divided into multiple shard chains, a multi-party computation system obtains attributes associated with a first shard chain. The attributes may represent characteristics of the first shard chain, characteristics of transactions recorded in the first shard chain, and characteristics of the computer nodes configured to manage the first shard chain. Based on the attributes, the multi-party computation system determines a multi-party computation scheme that specifies a minimum threshold number of nodes required to participate in a transaction validation process and at least one required node required to participate in the transaction validation process for the first shard chain. The multi-party computation system configures the computer nodes configured to manage the first shard chain to perform the transaction validation process according to the multi-party computation scheme.
SYSTEM AND METHOD FOR IDENTIFYING AN ELECTRIC VEHICLE THROUGH ALTERNATING CURRENT ELECTRIC CHARGING
A system and method for identifying an electric vehicle through an alternating current electric charging that include receiving a charging command to initiate the alternating current electric charging of the electric vehicle (EV) through electric vehicle supply equipment (EVSE). The system and method also include generating a duty cycle pattern that pertains to the electric charging of the EV that includes at least one encrypted data packet and communicating the duty cycle pattern to at least one of: the EV and the EVSE. The system and method further include comparing an identification of at least one of: the EV and the EVSE included within the at least one encrypted data packet of the duty cycle pattern with a pre-stored identification of: the EV and the EVSE to identify at least one of: the EV and the EVSE.
VEHICLE CONTROL USING SERVERLESS FUNCTIONS
Systems and methods for cloud-based keyless entry are generally described. In some examples, a first number is received from a vehicle. A first computing device of the vehicle may be configured to control an electronic door lock. A first unlock code may be generated using the first number. In some examples, a notification is sent to a remote entry device associated with the vehicle. A response to the notification may be received from the remote entry device. In some examples, the first number may be retrieved from a messaging service based at least in part on the receiving the response to the notification. A second unlock code may be generated using the first number. A determination may be made that the first unlock code matches the second unlock code. An instruction may be sent to the first computing device, the instruction effective to cause unlock of the electronic door lock.
ELECTRONIC DEVICE FOR SECURE COMMUNICATIONS WITH AN AUTOMOBILE
A mobile device securely communicates with an electronic device within an automobile. The mobile device transmits encrypted spatial state information and the electronic device provides commands to the automobile in response. Spatial state information may include location, motion, or the like. Commands to the automobile may include door unlock commands, remote start commands, horn honk commands, or the like.
USING LINE-OF-CODE BEHAVIOR AND RELATION MODELS TO ANTICIPATE IMPACT OF HARDWARE CHANGES
Disclosed herein are techniques for analyzing hardware change impacts based on at least one functional line-of-code behavior and relation model. Techniques include identifying a new hardware component associated with a system; accessing a first line-of-code behavior and relation model representing execution of functions using the new hardware component; accessing a second line-of-code behavior and relation model representing execution of functions on a previous hardware component of the system; performing a functional differential comparison of the first line-of-code behavior and relation model to the second line-of-code behavior and relation model; determining, based on the functional differential comparison, a status of functional equivalence between the new hardware component and the previous hardware component; and generating, based on the determined difference, a report identifying the status of functional equivalence.