H04L2209/84

ELECTRONIC CONTROL UNIT, COMMUNICATION APPARATUS, AND ACCESS ADMINISTRATION SYSTEM

An electronic control unit to be applied to a vehicle includes at least one electronic control unit. The at least one electronic control unit is configured to: store a public key; receive a role list to set a specific work permitted to be executed by the at least one electronic control unit from a communication apparatus; perform signature verification of the role list using the public key; set, based on the role list verified by the signature verification, an available work list indicating the specific work permitted to be executed; and execute, when receiving a request message requesting the specific work set in the available work list, a process of the specific work.

Electronic device for secure communications with an automobile

A mobile device securely communicates with an electronic device within an automobile. The mobile device transmits encrypted spatial state information and the electronic device provides commands to the automobile in response. Spatial state information may include location, motion, or the like. Commands to the automobile may include door unlock commands, remote start commands, horn honk commands, or the like.

Autonomous Drone System and Method
20230290254 · 2023-09-14 ·

A computer-implemented method, computer program product and computing system for monitoring a plurality of drones moving within a controlled space; receiving a request from an additional drone seeking permission to move within the controlled space; plotting an additional navigation path through the controlled space based, at least in part, upon the plurality of drones and known obstacles within the controlled space; and providing the additional navigation path to the additional drone.

PREVENTING REPLAY/RELAY ATTACKS IN KEYLESS ENTRY SYSTEMS

A method for controlling access to a resource, the method performed by a system comprising a first component, a second component and a third component, the first component comprising a first cryptographic key; the second component comprising a second cryptographic key. The method comprising: transmitting a signal; generating, by the first component a first channel observation; generating, by the second component, a second channel observation, and a first data value based on the second channel observation and the second cryptographic key; transmitting, by the second component, the second channel observation and the first data value; and verifying the second component based on the second channel observation, the first cryptographic key and the first data value; and allowing access to the resource in response to determining that the second component is: 1) permitted to gain access to the resource; and 2) located proximate to the first component.

Identifying software dependencies using controller code models
11741280 · 2023-08-29 · ·

Disclosed herein are techniques for identifying software dependencies based on functional line-of-code behavior and relation models. Techniques include accessing a first line-of-code behavior and relation model representing execution of functions of a first portion of executable code, the first portion of executable code being associated with a first symbol; detecting a change to the first portion of executable code; constructing, based on the changed first portion of executable code, a second line-of-code behavior and relation model representing execution of functions of the changed first portion of executable code; determining, based on the constructed second model, a dependency between (i) the changed first portion of executable code or the first symbol and (ii) a second symbol; and generating, based on the determined difference, a report identifying the dependency.

Physically secured device for vehicle intrusion detection

A vehicle theft-prevention apparatus can include a locking mechanism with an engagement component. The locking mechanism can be engaged via a first action to apply a force on the vehicle when in an engaged state. The locking mechanism can disengage, via a second action, to withdraw the force from the vehicle when in the engaged state. The locking mechanism can maintain a current state of the force in response to the first action and the second action when in a disengaged state. One or more computing devices can receive a command to enable or disable the locking mechanism. In response to receiving the command, the computing device can cause the engagement component to transition the locking mechanism from the disengaged state to the engaged state or from an engaged state to a disengaged state.

METHODS AND SYSTEMS FOR TRUSTED MANAGEMENT OF TRAFFIC VIOLATION DATA USING A DISTRIBUTED LEDGER

Disclosed herein are methods and systems for managing traffic violation or enforcement data using a distributed ledger. The distributed ledger provides a transparent chain of custody/evidence related to all digital interactions with traffic violation or enforcement data. The distributed ledger can be audited for data accuracy and integrity by nodes making up the system each time one of the nodes interacts with the traffic violation or enforcement data. For example, a digital evidence package related to a traffic violation event can be generated by a node within the system and a package digest can be logged in the distributed ledger beginning with the creation of the digital evidence package and each time that the digital evidence package is processed, modified, or reviewed by nodes within the system.

UWB SYSTEM
20230137042 · 2023-05-04 · ·

The present invention is proposed to solve the above problems and is directed to providing a UWB system comprising: a memory in which a UWB ranging factor definition program is embedded; and a processor which executes the program, wherein the processor predefines UWB ranging factors to define an encryption key in consideration of a unique m-byte key characteristic for each set of a vehicle and a device.

UWB SYSTEM
20230137532 · 2023-05-04 · ·

According to an aspect of the present invention, there is provided a ultra-wideband (UWB) system comprising: a memory in which a UWB ranging factor definition program is embedded; and a processor which executes the program, wherein the processor predefines UWB ranging factors to define a scrambled timestamp sequence (STS) index in consideration of a characteristic of an n-byte random value that is changed every ranging.

UWB SYSTEM
20230135499 · 2023-05-04 · ·

The ultra-wideband (UWB) system includes an input unit configured to receive information on a separation distance between a tag and a vehicle, a memory in which a ranging program corresponding to the separation distance is embedded and a processor which executes the program, wherein the program determines a ranging scheme and an anchor to perform ranging according to the separation distance.