Patent classifications
H04L2209/84
Access Control System for Electric Vehicle Charging
An access control system for electric vehicle charging is provided that includes an access device, a secure reservation interface, a reservation server and a smartphone application installed on the smartphone. The access device includes a short-range wireless communication module connected to a processor having control of an electric vehicle charger. The secure reservation interface receives a reservation request for a reservation at a given destination. The reservation server receives the reservation request for the destination, issues a reservation certificate, and transmits the reservation certificate from the reservation server to a smartphone. The smartphone application has access to a short range wireless communication setting corresponding to the access device. The access device receives the reservation certificate from the smartphone application based on use by the smartphone application of the short-range wireless communication setting. The processor activates the electric vehicle charger based on at least the receipt of the reservation certificate.
Systems and methods for maintaining transferability of title via blockchain
The present embodiments relate to systems and methods for using a blockchain to record information related to the lifecycle of a vehicle associated with a Vehicle Identification Number (VIN), or other vehicle identifier. For example, the VIN lifecycle process may be used to ensure the transferability of title, including when information relevant to transferability is not easily determinable, such as after a collision occurs. The systems and methods may include the reception of a mileage report corresponding to a vehicle and updating a blockchain to associate the vehicle with mileage information. The systems and methods described herein may allow for using a blockchain which gives the option for private information, and permissioned participants in the blockchain. In particular, the systems and methods allow for a distributed consensus amongst businesses, consumers, and authorities, as to the validity of information and transactions stored on the blockchain.
Identifying software interdependencies using line-of-code behavior and relation models
Disclosed herein are techniques for identifying software interdependencies based on functional line-of-code behavior and relation models. Techniques include identifying a first portion of executable code associated with a first controller; accessing a functional line-of-code behavior and relation model representing functionality of the first portion of executable code and a second portion of executable code; determining, based on the functional line-of-code behavior and relation model, that the second portion of executable code is interdependent with the first portion of executable code; and generating, based on the determined interdependency, a report identifying the interdependent first portion of executable code and second portion of executable code.
QUANTUM AUTHENTICATION IN WIRELESS COMMUNICATION NETWORKS
A wireless User Equipment (UE) performs quantum authentication with a wireless communication network. The wireless UE receives qubits that were generated by the wireless communication network and determines polarization states for the qubits. The wireless UE exchanges cryptography information with the wireless communication network. The wireless UE and the wireless communication network both generate cryptography keys based on the polarization states and the cryptography information. The wireless UE generates authentication data based the cryptography keys. The wireless UE wirelessly transfers the authentication data to the wireless communication network. The wireless communication network authenticates the wireless UE based on the authentication data and the cryptography keys.
Physically secured device for vehicle intrusion detection
A vehicle theft-prevention apparatus can include a slip clutch mechanism, a locking mechanism, and a cylindrical body including a first portion and a second portion. The first portion can be configured to rotate about the second portion. The locking mechanism can be configured to engage based on rotation of the first portion relative to the second portion in a first direction, and disengage based on a rotation of the first portion relative to the second portion in a second direction. The slip clutch mechanism can be configured to prevent the locking mechanism from further engaging from rotation in the first direction relative to the second portion based on a magnitude of force applied.
Blockchain-based failsafe mechanisms for autonomous systems
Embodiments provide systems, methods, and computer-readable storage media configured to leverage blockchain technologies to provide failsafe action and fault mitigation processing for autonomous systems. Such autonomous systems may include self-driving cars, logistics or manufacturing robots, or control processes in chemical manufacturing and processing facilities, or construction machinery or sites, and may utilize artificial intelligence (AI) and/or machine learning (ML) algorithms to control operations. These algorithms may be imperfect and subject to error. The disclosed blockchain-based techniques perform data analysis in a parallel and distributed manner (e.g., locally at the autonomous system and remotely at a node of a blockchain platform) to validate the information provided to the AI and/or ML algorithms, as well as the outputs of the algorithms. When anomalies or other issues are detected based on the data analysis, one or more failsafe actions may be executed to control operation of the autonomous systems in a safe manner.
Physical structure for vehicle intrusion detection device
A vehicle theft-prevention apparatus can include a body, a computing device, sensors, and a speaker. The body can include a first and second portion and a light emitting portion. The first portion can move relative to the second portion. The second portion can include perforations to facilitate sound transmission from the speaker. The light emitting portion can be positioned between the first portion and the second portion. The light emitting portion can be configured to emit light based on a signal from the computing device. A lens can include a concentric structure protruding from the body. The lens can cover the sensor.
System and method for authentication and cryptographic ignition of remote devices
A method of remotely initializing at least one device is disclosed. The method includes initializing at a local host a cryptographic authorization sequence after receiving a secure input value. The method further includes receiving at a local host cryptographic controller a first authorization request from a first remote device. After a challenge-response authentication protocol, the first remote device is authenticated and receives a public key infrastructure certificate. The method includes receiving at a first remote cryptographic controller a second request from a second remote device. After a challenge-response authentication protocol, the first remote device is authenticated, but does not receive a public key infrastructure certificate. A system for remotely initiating at least one device is also disclosed.
Assigning categories for messages and symmetric key per category to localize the impact in case of key compromise
Systems and methods described herein provide for assigning classifications to signals and corresponding messages for prioritization and transmission across a vehicle CAN bus. The assigned classifications are used to select authentication keys specific to each classification of message. Nodes of the CAN bus can include different sets of keys based on the classifications of messages handled at the nodes. Keys are distributed and localized to reduce any potential impact on critical functions of the vehicle system that may result from compromise of an authentication key.
END-TO-END COMMUNICATION SECURITY
In one implementation, a method for providing end-to-end communication security for a controller area network (CANbus) in an automotive vehicle across which a plurality of electronic control units (ECU) communicate is described. Such an automotive vehicle can include, for example, a car or truck with multiple different ECUs that are each configured to control various aspects of the vehicle's operation, such as an infotainment system, a navigation system, various engine control systems, and/or others.