H04L2209/84

Method and system for handling dynamic cybersecurity posture of a V2X entity

A method at a network element, the method including receiving at least one message at the network element, the at least one message being one or both of: an update status information message from an updates server; and an anomaly detection status information message from anomaly detection server; determining, based on the receiving the at least one message, a dynamic cybersecurity posture indication for an intelligent transportation system entity; and providing the dynamic cybersecurity posture indication for the intelligent transportation system entity to an Enrolment Authority, wherein the dynamic cybersecurity posture indication can be included in a certificate relating to the intelligent transportation system entity.

Using a Distributed Ledger to Determine Fault in Subrogation

Systems and methods are disclosed with respect to using a blockchain for managing the subrogation claim process related to a vehicle accident, in particular, determining fault as part of the subrogation process. An exemplary embodiment may include receiving an electronic notification of a vehicle collision; receiving sensor data (such as telematics, image, audio, vehicle operational, or other sensor data) related to the vehicle collision; determining a percentage of fault of the vehicle collision for one or more vehicles, vehicle systems, and/or drivers based upon, at least in part, analysis of the sensor data collected; and creating a blockchain for the vehicle collision with one or more links to the sensor image data and an indication of the percentage of fault(s) determined to facilitate blockchain-based claim handling.

Retention and revocation of operation keys by a control unit
11405221 · 2022-08-02 · ·

An electronic key fob device, in one embodiment, includes a transmitter, a counter configured to provide a current counter value indicated by a plurality of bits, a memory configured to store an operation key, and a processor coupled to the transmitter and memory. The processor is configured to encrypt the current counter value using the operation key to produce an encrypted counter value, select a subset of the plurality of bits of the current counter value, transmit a message the includes the encrypted counter value and the subset of plurality of bits of the current counter value.

Access Control System and Method for Use by an Access Device
20220222994 · 2022-07-14 · ·

Systems and methods are provided to allow a smart phone or any terminal to activate a lock using a web site or server computer system. An access control system is provided that includes a server and an access device. The access device includes a processor and a communication module. The process has control of a lock and is able to receive a reservation certificate presented by a portable terminal through the communication module. The processor activates the lock when a current reservation certificate has been presented.

Access control system and method for use by an access device

Systems and methods are provided to allow a smart phone or any terminal to activate a door lock using a web site or server computer system. An access control system is provided that includes a server and an access device. The access device includes a processor and a communication module. The process has control of a door lock and is able to receive a reservation certificate presented by a portable terminal through the communication module. The processor activates the door lock when a current reservation certificate has been presented.

Data bus protection device and method
11386201 · 2022-07-12 · ·

A bus control device is enabled for placement between an input port to which a suspect device would be connected and the bus. In this manner, all message received from the suspect device, such an infotainment system, must pass through the bus control device. A separate intrusion detection device is coupled to the bus. The bus control device is arranged to output a notification message to the intrusion detection device, the notification message comprising information about the received message. The intrusion detection device is arranged to determine the validity of the received message responsive to the received notification message.

Presence-based network authentication
11412045 · 2022-08-09 · ·

Systems and methods are provided to authenticating an electronic device with a wireless network using a presence-based authentication process. As part of the presence-based authentication process, an authentication entity may receive a registration message from an electronic device. The authentication entity may respond to the registration message by transmitting an authentication challenge associated with providing access to the wireless network and/or network feature thereof. If the electronic device provides a successful response to the authentication challenge, then the authentication entity may authenticate the electronic device to utilize the wireless network and/or network feature thereof.

Inband telemetry for a virtual transponder

Systems, methods, and apparatus for inband telemetry for a virtual transponder are disclosed. A disclosed method for inband telemetry for a virtual transponder comprises transmitting, by a payload antenna on a vehicle, a payload signal to a hosted receiving antenna. The method further comprises transmitting, by the payload antenna, a hosted telemetry signal to the hosted receiving antenna. In one or more embodiments, the hosted telemetry signal and the payload signal are transmitted on the same frequency band.

AUTHENTICATION SYSTEM AND AUTHENTICATION METHOD

An authentication system includes a first controller that performs wireless communication with a mobile terminal and a first authentication unit that executes authentication of the mobile terminal including ID authentication and code authentication through the wireless communication performed between the first controller and the mobile terminal. The first authentication unit executes the code authentication by determining whether a terminal-side calculation result obtained by the mobile terminal matches a controller-side calculation result obtained by the first controller. The authentication system further includes a second controller that communicates with the mobile terminal and a second authentication unit that applies encryption communication using a portion of the terminal-side calculation result and a portion of the controller-side calculation result to communication performed between the second controller and the mobile terminal and authenticates the encryption communication.

METHOD AND SYSTEM FOR REDUCED V2X RECEIVER PROCESSING LOAD USING NETWORK BASED APPLICATION LAYER MESSAGE PROCESSING
20220209964 · 2022-06-30 ·

A method at a network element for processing a first message destined for an intelligent transportation system station, the method including receiving from a sending entity, or generating, the first message at the network element; based on a source or contents of the first message, performing one of: discarding the first message; or modifying the first message to provide an indication to the intelligent transportation system station of checks the intelligent transportation system does not need to perform, thereby creating a second message; and forwarding the second message to the intelligent transportation system station.