H04L2209/84

DYNAMIC CFI USING LINE-OF-CODE BEHAVIOR AND RELATION MODELS
20220222173 · 2022-07-14 · ·

Disclosed herein are techniques for analyzing control-flow integrity based on functional line-of-code behavior and relation models. Techniques include receiving data based on runtime operations of a controller; constructing a line-of-code behavior and relation model representing execution of functions on the controller based on the received data; constructing, based on the line-of-code behavioral and relation model, a dynamic control flow integrity model configured for the controller to enforce in real-time; and deploying the dynamic control flow integrity model to the controller.

Systems and methods for secure communications in vehicle telematics systems
11381402 · 2022-07-05 · ·

A vehicle telematics system is provided having secure communication capabilities between a vehicle telematics device and external computing devices. In one embodiment, the vehicle telematics device includes a processor; a memory coupled to the processor and storing a vehicle telematics application; and a security chip coupled to the processor and the memory, wherein the security chip is configured to support a Transport Layer Security (TLS) stack.

Systems and Methods for Usage Based Insurance Via Blockchain

The present embodiments relate to systems and methods for using a blockchain or shared ledger to generate Usage-Based Insurance quotes for a vehicle tracked over its lifecycle according to a Vehicle Identification Number (VIN), or other vehicle identifier. A mileage report stored on the shared ledger may be searched according to the vehicle's VIN and a Usage-Based Insurance quote may be generated based upon the mileage report. Periodic updates to the mileage report may be broadcast to the blockchain in transactions that updated the shared ledger. An estimated vehicle usage may be determined based upon the cryptographic proof of the blockchain and a Usage-Based Insurance quote generated thereon.

Electronic control device, program falsification detection method, and computer readable non- transitory tangible storage medium

An electronic control device includes: a memory that stores a plurality of divided programs obtained by dividing a program and a verification authenticator, a cryptographic operator that generates a partial authenticator for each of the plurality of divided programs in a cryptographic operation; and a verification unit that generates a operation authenticator by performing a logic operation using the plurality of partial authenticators, and verifies a falsification of the program by determining whether the verification authenticator and the operation authenticator match.

DEVICE AND METHOD FOR MANAGING SHARED DIGITAL KEY
20220216987 · 2022-07-07 ·

The present disclosure relates to a method of managing a shared digital key. An operating method of an electronic device for managing a digital key, according to various embodiments of the present disclosure, includes: receiving a response message to a request message for managing a shared digital key; verifying information included in the received response message; and managing the shared digital key based on the verified information.

Mobility device

A powered balancing mobility device that can provide the user the ability to safely navigate expected environments of daily living including the ability to maneuver in confined spaces and to climb curbs, stairs, and other obstacles, and to travel safely and comfortably in vehicles. The mobility device can provide elevated, balanced travel.

VERIFYING VEHICULAR IDENTITY
20220224548 · 2022-07-14 ·

The present disclosure includes apparatuses, methods, and systems for verifying a vehicular identity. An embodiment includes a processing resource, memory, and a vehicular communication component configured to verify an identity of the particular vehicle using a public key, wherein the public key is received in response to a departure of the particular vehicle, and request, in response to verifying the identity of the particular vehicle, data corresponding to information associated with the departure of the particular vehicle.

SECURE COMMUNICATION FOR A KEY REPLACEMENT
20220224519 · 2022-07-14 ·

The present disclosure includes apparatuses, methods, and systems for secure communication for a key replacement. An embodiment includes a processing resource, memory having a first operator's key, and a vehicular communication component. The vehicular communication component can be configured to provide, to a server, a public key generated along with a private key and decrypt, in response to receipt of a second operator's key (e.g., received in response to providing the public key to the server) encrypted using the public key, the second operator's key using the private key. The vehicular communication component can be configured to replace, in response to decrypting the encrypted second operator's key, the first operator's key with the second operator's key.

DATA LINK LAYER AUTHENTICITY AND SECURITY FOR AUTOMOTIVE COMMUNICATION SYSTEM
20220255963 · 2022-08-11 ·

The present disclosure relates to authenticity and data security for bus based communication networks in a vehicle. The present disclosure teaches a protocol frame, a sender on data link layer, and a receiver on data link layer providing such authenticity and data security as well as a communication network in a vehicle employing the protocol frame, the sender and the receiver according to the present disclosure.

SECURE COMMUNICATION BETWEEN AN INTERMEDIARY DEVICE AND A NETWORK
20220247731 · 2022-08-04 ·

The present disclosure includes apparatuses, methods, and systems for secure communication between an intermediary device and a network. An example apparatus includes a memory, and circuitry. The circuitry is configured to determine, in response to receipt of a request for information corresponding to a particular category, an identifier associated with the particular category. The circuitry is further configured to provide, along with a signature, the determined identifier to a network device, wherein the requested information are received in response to the signature being verified by network device.