H04L2209/84

Vehicle, network component, method, computer program and device for generating an id for an equipped status of a vehicle

Exemplary embodiments create a vehicle, a network component, a method, a computer program and a device for generating an ID for an equipped status of a vehicle. The method for generating an ID for an equipped status of a vehicle comprises determining a first information on one or more available software components and their software versions and determining a second information on one or more available hardware components and their hardware versions. The method moreover comprises generating a hash value based on the first information, the second information and software content of the one or more software components, and providing the hash value as an ID for the equipped status of the vehicle.

Protection Against Relay Attack for Keyless Entry Systems in Vehicles and Systems
20220322095 · 2022-10-06 · ·

Aspects of the subject disclosure may include, for example, a device in which a processing system of a remote entry system selects a first circuit from a plurality of circuits of a key remote from the device; wirelessly transmits a first challenge signal to the key, the first challenge signal specifying the first circuit; and wirelessly receives a first response signal from the key, the first response signal having a first response signal power level and a first response signal delay with respect to the first challenge signal. The processing system analyzes the first response signal by comparing the first response signal power level and the first response signal delay respectively with a predetermined first signal power and predetermined first time delay associated with the first circuit; and, in accordance with the comparing, determines whether to enable the entry system. Other embodiments are disclosed.

SECURED HD MAP SERVICES USING BLOCKCHAIN
20220286305 · 2022-09-08 ·

Various systems and methods for implementing secure high-definition map services are described herein. A system for implementing secure high-definition map services includes a processor subsystem; and a storage including instructions, which when executed by the processor subsystem, cause the processor subsystem to: receive map data from a remote data source; authenticate the remote data source; obtain an identifier of the remote data source; add the map data to an entry in an immutable log when the remote data source is authenticated, the entry having an entry identifier; store an association between the identifier of the remote data source and the entry identifier in a secure store; and incorporate the map data into a master map.

SENSOR FOR GENERATING TAGGED SENSOR DATA
20220297705 · 2022-09-22 ·

A method, apparatus and system for generating sensor data comprising a subset of tagged sensor data. The method includes: sensing, using a sensing element, ambient data, wherein the ambient data characterises a condition of an environment proximate to the sensing element; identifying, using a data identification engine, at least a first subset of the ambient data comprising a representation of, or identifying information related to, personally relevant information obtained by the sensing element; tagging, using a data tagging engine, the first subset of the ambient data with at least one data tag; and outputting, via the communication interface, at least a second subset of the ambient data comprising ambient data that has not been tagged by the data tagging engine.

Remote control system for vehicle and operating method thereof
11433852 · 2022-09-06 · ·

A remote control system for a vehicle including: a user terminal; and a vehicle configured to transmit/receive information to/from the user terminal through a communication network. The vehicle performs first authentication on a user by comparing a captured image of the user to a reference image in response to an unlocking signal or start-up request signal received from the user terminal, and transmits second authentication pre-processing information to the user terminal, the second authentication pre-processing information being obtained by generating an encryption key from a feature vector extracted from the image of the user and encrypting unique information of the user. The user terminal performs second authentication on the user by decrypting the second authentication pre-processing information received from the vehicle with a decryption key stored therein.

Systems and methods for establishing identity for order pick up

Example embodiments of systems and methods for secure online order pick up and data transmission system between transmitting and receiving devices are provided. In an example embodiment, a user may be required to confirm his or her identity prior to using an application, utilizing enhanced or restricted features of an application or device, viewing sensitive information, or taking certain actions. A transmitting device, such as a contactless card, may be employed as means for confirming a user's identity and access these features.

Method and system for storing driving record data based on block chain
11442926 · 2022-09-13 · ·

A method for storing driving record data based on a blockchain comprises generating and storing driving record information associated with a driving of a vehicle; detecting occurrence of a predetermined event to the vehicle; if the occurrence of the event is detected, extracting driving record information related to the event from the stored driving record information; converting the extracted driving record information into transaction data; and transmitting the converted transaction data to a consortium blockchain network system.

Voltage encoded MAC and bus scrambling

Various embodiments are generally directed to providing authentication and confidentiality mechanisms for message communication over an in-vehicle network. For example, authentication data associated with a communicating node may be transmitted over the network by encoding different predefined voltage levels on top of the message bits of the message being communicated. Different voltage levels may represent different encodings, such as a bit-pair or any bit combination of the authentication data. In a further example, messaging confidentiality between at least two communicating nodes may be achieved by pseudo-randomly flipping, or scrambling, the dominant and recessive voltages of the entire message frame at the analog level based on a pseudo-random control bit sequence.

Parking infrastructure powered by a decentralized, distributed database

A parking system having parking lots and server computers configured to control access to the parking lots. The server computers are connected via a communications network to form a peer to peer network of computing nodes. The peer to peer network of computing nodes hosts a decentralized, distributed database that stores activity records of parking spaces in the parking lots. The peer to peer network can include vehicles planning to use parking services of the parking lots and/or mobile devices connected to infotainment systems of the vehicles. Alternatively, the peer to peer network is formed by parking applications running in the vehicles and/or the mobile devices. The records in the decentralized, distributed database provide parking space availability information and/or can be used to regulate and/or plan parking reservation, usage, and navigational guidance to reach available parking spaces.

Identifying software dependencies using controller code models
11442850 · 2022-09-13 · ·

Disclosed herein are techniques for identifying software dependencies based on functional line-of-code behavior and relation models. Techniques include accessing a first line-of-code behavior and relation model representing execution of functions of a first portion of executable code, the first portion of executable code being associated with a first symbol; detecting a change to the first portion of executable code; constructing, based on the changed first portion of executable code, a second line-of-code behavior and relation model representing execution of functions of the changed first portion of executable code; determining, based on the constructed second model, a dependency between (i) the changed first portion of executable code or the first symbol and (ii) a second symbol; and generating, based on the determined difference, a report identifying the dependency.