Patent classifications
H04L2209/84
Method for encrypted communication in an ad-hoc network
A method in a network having a plurality of network nodes comprises the following steps performed in a first node of the network: receiving an initiation message from a second node of the network, the received initiation message comprising a public key of the second node; determining at least one of a proximity or velocity measure of the second node; checking whether the at least one determined measure is below a threshold and, when so, emitting a reply message comprising an encrypted part and an encryption key encrypted with the received public key from the second node; and repeatedly emitting status messages, wherein at least a part of each emitted status message is encrypted with the encryption key.
Method and system for managing vehicle generated data
A system for collecting and managing vehicle-generated data from multiple vehicles are provided. The vehicle-generated data is pseudonymized by pseudonymized identifiers, and the pseudonymized vehicle-generated data is collected and managed by a neutral data server operated by an operator who is independent of vehicle manufacturers. Vehicle manufacturers can reestablish the link of the pseudonymized event data with the vehicle that had generated the event data and the vehicle driver.
PROCESSING OF REQUESTS
An example operation may include one or more of receiving, by a dealer node, a request for a transport with a set of properties, querying, by the dealer node, a plurality of dealer nodes for the transport based on the set of the properties, responsive to receiving transport availability notifications, requesting a transfer of the transport from at least one dealer node of the plurality of the dealer nodes, receiving agreements from the plurality of the dealer nodes for the transfer of the transport, and recording the transfer of the transport on a remote storage.
KEY UPDATE METHOD AND RELATED APPARATUS
Embodiments of this application provide a key update method and a related apparatus. One example method includes: sending a first key update request to a second node, where the first key update request includes a first key negotiation parameter and first identity authentication information, and the first identity authentication information is generated by using a first shared key; receiving a first response message from the second node, where the first response message includes second identity authentication information; performing verification on the second identity authentication information by using the first shared key; and if the verification on the second identity authentication information succeeds, determining a first target key based on the first key negotiation parameter.
USING PKI FOR SECURITY AND AUTHENTICATION OF CONTROL DEVICES AND THEIR DATA
Method for authenticating a first and a second electronic devices associated through a communication line includes: creating a unique ID, by a third electronic device; transmitting the unique ID to the first electronic device; signing the transmitted unique ID by the first electronic device; transmitting the signed unique ID to the second electronic device, by the first electronic device; signing the transmitted signed unique ID by the second electronic device; transmitting the unique ID signed by the first and second electronic devices to the third electronic device; verifying and accepting the unique ID signed by the first device and the second device, by the third device; issuing a certificate for a secure communication line between the first electronic device and the second electronic device; and transmitting the certificate to the first electronic device and the second electronic device.
COMMUNICATION METHOD AND RELATED COMMUNICATION APPARATUS AND STORAGE MEDIUM
The present disclosure provides a communication method, a related communication apparatus, and a storage medium. The communication method includes: generating a first key by using a random sequence; encrypting data by using the first key to generate encrypted data; writing the encrypted data into a memory; encrypting the random sequence and a storage address of the encrypted data in the memory by using a public key; and sending the encrypted storage address and the encrypted random sequence to a second node from a first node.
Time-based encryption key derivation
Techniques are disclosed securely communicating traffic over a network. In some embodiments, an apparatus includes a first circuit having a local clock configured to maintain a local time value. The first circuit is configured to determine a synchronized time value based on the local time value, the synchronized time value being an expected time value of a reference clock. The first circuit is further configured to generate a first encryption key by calculating a key derivation function based on the synchronized time value and encrypt a portion of a packet using the first encryption key, the portion of the packet being to be communicated to a second circuit. In some embodiments, the apparatus further includes a first network node coupled to the first circuit and configured to communicate the packet to a second network node coupled to the second circuit and to include the synchronized time value in the packet.
Vehicle communication system
A vehicle communication system includes a switching hub incorporated in a vehicle and including a switch IC and an external CPU. The switch IC includes an internal CPU and performs a transfer process of transferring information to a communication device. The external CPU is provided outside the switch IC and connected to the switch IC, and has higher information processing capability than the internal CPU. The external CPU can perform a transfer order process of ordering to transfer information to the communication device and perform a security process of securing the security of the information to be transferred when the transfer order process is performed. The internal CPU monitors the operation of the external CPU and when the external CPU is abnormal, performs the transfer order process instead of the external CPU.
Moving object sharing method and apparatus using edge computing in fleet system
A moving object sharing service in a fleet system is provided. In a fleet system providing a moving object sharing service, the device searches for an available moving object, performs authentication for the moving object searched, and controls the moving object when the authentication is completed; and the authentication for the moving object is performed through the moving object and first nodes located within a predetermined range from the moving object.
Compiling a signature
A device is suggested including a cryptographic module, wherein the device is operable in a secure mode and in a non-secure mode, wherein the cryptographic module is configured in the secure mode by storing a secret key and a seed value in the cryptographic module, and wherein the device is operable in the non-secure mode to generate a signature based on input data utilizing the secret key and the seed value. Also, a method for operating such device is provided.