H04L2209/84

Verification of messages using hash chaining

According to some embodiments, in a Vehicular-to-Everything (V2X) communications environment where vehicles can exchange messages with other entities, including nearby vehicles and pedestrians, systems and methods are provided to implement a mechanism or technique based on hash chaining that allows a large sequence of messages from the same source to be validated by verifying a single digital signature.

Methods for fast, secure boot from nonvolatile memory device and corresponding systems and devices for the same

A method can include storing host code executable by a host device in a nonvolatile memory (NVM) device and NVM code executable by the NVM device. The NVM device can validate the integrity of the NVM code in response to predetermined conditions and generate a code integrity value for validating the NVM code. The code integrity value having a size independent of a size of the host code. An authentication code can be sent to the host device that is generated with at least the code integrity value. In response to read requests from the host device, returning at least portions of the host code for execution by the host device. Corresponding devices and systems are also disclosed.

Using a Distributed Ledger to Determine Fault in Subrogation

Systems and methods are disclosed with respect to using a blockchain for managing the subrogation claim process related to a vehicle accident, in particular, determining fault as part of the subrogation process. An exemplary embodiment may include receiving an electronic notification of a vehicle collision; receiving sensor data (such as telematics, image, audio, vehicle operational, or other sensor data) related to the vehicle collision; determining a percentage of fault of the vehicle collision for one or more vehicles, vehicle systems, and/or drivers based upon, at least in part, analysis of the sensor data collected; and creating a blockchain for the vehicle collision with one or more links to the sensor image data and an indication of the percentage of fault(s) determined to facilitate blockchain-based claim handling.

QUANTUM AUTHENTICATION IN WIRELESS COMMUNICATION NETWORKS
20230361996 · 2023-11-09 ·

A wireless communication network generates and transfers qubits to a wireless user device. The wireless communication network and the wireless user device determine polarization states for the qubits. The wireless communication network and the wireless user device exchange cryptography information. The wireless communication network and the wireless user device generate cryptography keys based on the polarization states and the cryptography information. The wireless communication network and the wireless user device encrypt and decrypt data that they exchange with one another based on the cryptography keys.

Systems and methods for centrally managing and routing multiple credentials

Systems, methods, and computer-readable media for managing digital certificates and other security credentials. A routing and management server is communicatively connected to a certificate user device and to a plurality of certificate generators. The server performs operations that may include: optionally registering the certificate user device; receiving a request for one or more digital certificates from the certificate user device; analyzing the request to determine an appropriate certificate generator, from among the plurality of certificate generators, for producing the one or more digital certificates; optionally translating the request into a format required by the appropriate certificate generator; transmitting the request to the appropriate certificate generator; receiving the one or more digital certificates from the appropriate certificate generator; and providing the one or more digital certificates to the certificate user device.

SHARED HARDWARE SECURITY MODULE

A system includes a plurality of electronic control units (ECUs) and a shared high security module (sHSM) separate from and connected to the plurality of ECUs over one or more private networks. At least one of the ECUs, over at least one of the plurality of private networks, authenticates a session with the sHSM and requests servicing during the authenticated session. The servicing includes encryption, decryption, or authentication, of a message designated to be handled by the at least one ECU and included in the request for servicing. The sHSM receives the message, performs the requested servicing of the message using capabilities onboard the sHSM, and publishes a serviced version of the message to a designated controller area network bus.

Apparatus and method for securely updating binary data in vehicle
11805407 · 2023-10-31 · ·

The apparatus for securely updating the binary data in the vehicle includes a plurality of nodes that transmit/receive block data to/from each other through a wireless network. Each of the plurality of nodes includes a data reception unit that receives block data from another node, a data verification unit that compares the block data received from the another node with previously stored block data, a data correction unit that deletes the block data, or combines the block data with the previously stored block data and encrypts the combined block data to generate corrected block data, a data storage unit that stores the corrected block data, and a data transmission unit that transmits the corrected block data to another node.

Method and apparatus for providing an individually secure system to multiple distrusting parties

The present application relates to a method and apparatus for intelligent wireless protocol optimization including storing, in a memory, a first customer key and a second customer key, receiving, by a processor, a secret key, decrypting, by the processor, the secret key using a first customer key to extract a master key, provisioning, by the processor, an electronic control unit in response to the master key, and deleting, by the processor, the second customer key in response to the provisioning of electronic control unit in response to the master key.

Key management method used in encryption processing for safely transmitting and receiving messages

A key management method serves as an electronic control unit (ECU) in an onboard network system having a plurality of ECUs that perform communication by frames via a network. The method includes storing, in a first-type ECU, a shared key to be mutually shared with second-type ECUs, and executing encryption processing regarding a framed transmitted or received via the network, based on the shared key. The method further includes executing, by the first-type ECU, inspection of a security state of the shared key stored by the second type ECUs in a case where a vehicle is in at least one of the following particular states, including immediately after the vehicle is not driving and is entering the accessory-on state, immediately after the vehicle is not driving and the vehicle is entering the accessory-off state, and immediately after the vehicle engine is started.

METHOD FOR ANALYZING AN EMITTED AMOUNT OF SUBSTANCE
20230341294 · 2023-10-26 ·

A method for analyzing an amount of substance emitted as a result of the operation of a functional unit of a utility vehicle includes generating signals from a signal source independently of the amount of substance, transmitting the signals to a data processing apparatus as input data for determining the emitted amount of substance, processing the input data in the data processing apparatus to form output data which represent the emitted amount of substance, and transferring the output data as transfer data to a storage unit of a digital distributed ledger.