H04L2209/84

Blockchain based hardware appliance authentication

Hardware appliances with multiple sensors, such as automobiles, can be authenticated on a blockchain based platform using authentication values generated data provided by the hardware appliances, such as sensor data, log data, location data. Requests for service can be managed by the blockchain based platform based on authentication values of the hardware appliances.

Active attack detection in autonomous vehicle networks

Systems, methods, computer-readable storage media, and apparatuses to provide active attack detection in autonomous vehicle networks. An apparatus may comprise a plurality of electronic control units communicably coupled by a network, and logic, at least a portion of which is implemented in hardware, the logic to: receive an indication from a first electronic control unit (ECU) of the plurality of ECUs specifying to transmit a first data frame via the network, determine, based on a message identifier (ID) of the first ECU, whether a transmit window for the first ECU is open, and permit the first ECU to transmit the first data frame via the network based on a determination that the transmit window for the first ECU is open.

INFORMATION PROCESSING DEVICE, MOBILE DEVICE, INFORMATION PROCESSING SYSTEM, METHOD, AND PROGRAM
20220289250 · 2022-09-15 ·

Individually-identifiable data included in observation information of a driver or the like of a vehicle or data for which recording processing is not permitted in a personal information protection regulation is abstracted or encrypted and recorded. A driver information acquisition unit that acquires the observation information of the driver of the vehicle and a data processing unit that inputs the observation information and executes data processing are included. The data processing unit divides the observation information into conversion unnecessary data and conversion necessary data, executes abstraction processing or encryption processing for the conversion necessary data, and stores conversion data such as abstraction data or encryption data in a storage unit. The data processing unit executes the abstraction processing or the encryption processing for the individually-identifiable data included in the observation information or the data for which recording processing is not permitted in the personal information protection regulation as the conversion necessary data.

Mobile can-bus control system
11460820 · 2022-10-04 · ·

A mobile CAN-Bus control system is provided, in which a CAN-Bus based machinery converts CAN control signals to a data stream based on a communication schema. At least a portion of the converted data stream includes an index lookup identifier, which, together with a locally stored index loop table, permits the receiving device to extract the control signal. The data stream, which is compatible with communication protocols such as Bluetooth™ and/or Wi-Fi, is transmitted to a mobile controller, which in turn parses the data stream and translates it into useable data points based on a locally stored index lookup table. The mobile controller may upload the received data stream to a server for data storage and retrieval, and is capable of remotely accessing the CAN-Bus based system to modify system parameter values and bumping them to the CAN-Bus system to achieved desired operational state of the machinery.

CUSTODIAL INTEGRITY FOR VIRTUAL DIGITAL ASSETS AND RELATED TECHNOLOGIES
20220263651 · 2022-08-18 ·

Described are techniques for providing custody of digital assets with a high degree of assurance of a proof that private keys are kept secret and not in possession of entities that should not have access to such keys. The techniques include a deployed space-borne vehicle that includes a data processing node that generates a remote custody key (RCK) pair, the RCK pair including a private RCK key known only to the data processing node and a public RCK key, upon receiving an indication of the deployment to the space-borne location and that establishes a communication channel between the deployed space-borne vehicle and a terrestrial based system, with the communication channel authenticated by a physical, earth-based item that is remotely identifiable by the space-borne vehicle.

Secure emergency vehicular communication

Secure emergency vehicular communication is described herein. An example apparatus can include a processing resource, a memory having instructions executable by the processing resource, and an emergency communication component coupled to the processing resource. The emergency communication component can be configured to generate an emergency private key and an emergency public key in response to being within a particular proximity from a vehicular communication component associated with a vehicular entity and in response to receiving a vehicular public key from the vehicular communication component. The emergency communication component can be configured to provide the emergency public key, an emergency signature, and notification data to the vehicular communication component.

Security certificate management and misbehavior vehicle reporting in vehicle-to-everything (V2X) communication

Embodiments of the present disclosure describe methods, apparatuses, storage media, and systems for a device disposed at an edge of a vehicular communication network or vehicles within a coverage area of the device. The device is to generate a list of vehicle security data to be distributed to vehicles currently within a coverage area of the device, based at least in part on a context related to the vehicles. The device is further to announce, on a control channel communicatively coupling the device and the vehicles, that the list of vehicle security data are available and a service channel to receive the list of vehicle security data. The list of vehicle security data are to be provided to the vehicles via the service channel. Other embodiments may be described and claimed.

WIRELESS COMMUNICATIONS FOR VEHICLE COLLISION RESPONSE
20220303765 · 2022-09-22 ·

The described technology is generally directed towards wireless communications for vehicle collision response. Devices onboard vehicles can wirelessly exchange information in response to detecting a collision. Public encryption keys can be exchanged, and exchanged information can optionally be encrypted using a received public encryption key. Exchanged information can include vehicle identification information and collision information. The collision information can furthermore be certified using a vehicle's private encryption key.

Certificate Revocation List Updating Method and Related Device
20220294649 · 2022-09-15 ·

A certificate revocation list updating method includes determining by a first road side unit (RSU), based on a first certificate revocation list stored by the first RSU, that a certificate used by a first on board unit (OBU) in a coverage area of the first RSU is revoked, sending, by the first RSU, a first notification message to one or more OBUs in the coverage area of the first RSU, where the first notification message notifies the one or more OBUs to update a certificate revocation list.

UPDATING REMOTE DATABASES

Systems and methods for updating remote databases are provided. In certain embodiments, a method includes determining an installed version for a remote database stored on a vehicle computer. Further, the method includes identifying an incremental update for the remote database, wherein the incremental update contains differences between a desired version for the remote database and the installed version. Additionally, the method includes providing the incremental update to the vehicle computer. Also, the method includes updating the remote database with the incremental update.