H04L2209/84

EV USER AUTHORIZATION METHOD AND SYSTEM
20220212559 · 2022-07-07 ·

Disclosed is an electric vehicle (EV) user authorization method for charging an EV, the method performed by a device for mediating EV user authorization, in association with a mobility operator (MO) who makes a contract with an EV user and provides a charging service to a corresponding EV and a charge point operator (CPO) who supplies electric power to the EV which requests charging. The EV user authorization method may comprise the steps of: receiving association information between the EV and a charging service account from the mobility operator; storing the association information between the EV and the charging service account; receiving an association information identification request for an EV to be charged, from the charge point operator; and providing association information between the EV to be charged and the charging service account to the charge point operator.

Mobile de-whitening

Systems and methods are disclosed and include receiving, with a peripheral device, a message packet from a portable device, the message packet including an authenticated packet with a de-whitened tone byte inserted therein. The portable device generates first message authentication code (MAC) bytes based on a shared secret key and generates the authenticated packet based on the first MAC bytes, first nonce bytes, and a message byte. The peripheral device validates the message packet in response to determining that the first MAC bytes match second MAC bytes and that the first nonce bytes match second nonce bytes. The peripheral device generates a reconstructed message packet in response to validating the message packet by removing the de-whitened tone byte from the authenticated packet. The communication gateway establishes a communication link between the portable device and the communication gateway in response to receiving the reconstructed message packet.

Electronic device sharing key with external electronic device and operating method for electronic device

An electronic device according to an embodiment may include a processor, a wireless communication module, and a security module. The security module may store and manage a shared key and an authentication key. The processor may be configured to receive a request for transmission of the authentication key to a first external electronic device and transmit, to the security module, information and command for generation of the shared key. The security module may generate the shared key based on the information for generation of the shared key, and the security module may transmit, to the first external electronic device, the generated shared key and information associated with the generated shared key. Various other embodiments are possible.

Method for controlling platooning and autonomous vehicle based on blockchain
11402853 · 2022-08-02 · ·

Provided are a method for controlling a platooning vehicle based on a blockchain and a platooning vehicle constituting the blockchain. According to a method for controlling a platooning vehicle based on a blockchain according to an embodiment of the present disclosure, it is possible to identify the blockchain data being modulated by comparing a hash value of second block with hash values of the first and third blocks in response to the execution of blockchain agreements. An autonomous vehicle according to the present disclosure may be linked with an artificial intelligence module, a drone (unmanned aerial vehicle (UAV)), a robot, an augmented reality (AR) device, a virtual reality (VR) device, devices related to 5G services, and the like.

System and method for recognition of biometric information in shared vehicle
11418346 · 2022-08-16 · ·

A system and method for recognition of biometric information for a shared vehicle in which data exposure is prevented which may otherwise occur when using a biometric recognition function in a shared vehicle or autonomous driving vehicle in a shared environment. The system and method may be associated with an AI device, a drone, an UAV, a robot, an AR device, a VR device, and a 5G service.

Visualization of code execution through line-of-code behavior and relation models
11416385 · 2022-08-16 · ·

Disclosed herein are techniques for visualizing and configuring controller function sequences. Techniques include identifying at least one executable code segment associated with a controller; analyzing the at least one executable code segment to determine at least one function and at least one functional relationship associated with the at least one code segment; constructing, a software functionality line-of-code behavior and relation model visually depicting the determined at least one function and at least one functional relationship; displaying the software functionality line-of-code behavior and relation model at a user interface; receiving a first input at the interface; in response to the received first input, animating the line-of-code behavior and relation model to visually depict execution of the at least one executable code segment on the controller; receiving a second input at the interface; and in response to the received second input, animating an update to the line-of-code behavior and relation model.

Method for improving the utilization rate of a vehicle-to-X communication device and vehicle-to-X communication device

A method for improving the utilization rate of a vehicle-to-X communication device for vehicle-to-X communication, having the steps: receipt of digital certificates by the vehicle-to-X communication device, generation of cryptographic keys for signing vehicle-to-X messages to be emitted using the digital certificates by an electronic computing apparatus, temporal spacing of the receipt of the digital certificates by the vehicle-to-X communication device, and generation of the cryptographic keys using the digital certificates. Furthermore, a vehicle-to-X communication device and use of the device in a vehicle or an infrastructure apparatus is provided.

System for key control for in-vehicle network

Disclosed is a system for performing key management of an in-vehicle network. The key management system of the in-vehicle network includes a reception unit configured to receive a shared secret key of a central gateway and a domain gateway, a memory configured to store a program for performing key management of the in-vehicle network using the shared secret key, and a processor configured to execute the program. The processor generates a secret key to be stored in a node of the in-vehicle network using the shared secret key and a unique ID of the node.

PARTIAL SENSOR DATA SHARING FOR CONNECTED VEHICLES

A method of partial sensor data sharing is described. The method includes detecting an occluded area relative to a receiver vehicle. The method also includes defining an area of interest (AoI) based on a traffic topology and state information of a selected sender vehicle. The method further includes transmitting the area of interest to the selected sender vehicle. The method also includes receiving a sensor data corresponding to the area of interest when the detected occluded area is within a sensor coverage area of the selected sender vehicle.

Systems and methods for managing a compromised autonomous vehicle server

Systems and methods for managing a compromised autonomous vehicle server are described herein. A processor may obtain an indication of a first server configured to control an autonomous vehicle being compromised. The autonomous vehicle may have previously been provisioned with a first public key. The first public key may be paired with a first private key. A processor may compile command information. The command information may include a command for the autonomous vehicle and a digital certificate of a second server configured to control the autonomous vehicle in the event of the first server being compromised. The digital certificate may include a second public key and may be signed with the first private key. The command may be signed with a second private key associated with the second server. The second private key may be paired with the second public key.