H04L2209/84

Systems and methods for tamper evident electronic detection

Systems and methods are directed to detecting tampering with a secured area of an autonomous vehicle. In one example, a computing system performs operations including generating a first key pair comprising a first private key and a first public key as part of a vehicle registration process; providing the first public key to one or more remote computing systems; determining whether a reset event occurred at a vehicle; in response to determining that the reset event occurred, discarding the first key pair and generating a second key pair comprising a second private key and a second public key; receiving a status query from one of the one or more remote computing systems; generating a response to the status query, the response being signed using either the first private key or the second private key; and providing the response to the one of the one or more remote computing systems.

Proof-of-work concept for a vehicle

A method for providing a Proof-of-Work concept in a vehicle is provided. The vehicle includes a network including at least three control units, where a first control unit sends a first message to a second control unit, the second control unit sends a second message including the first message to a third control unit, and the third control unit determines a Proof-of-Work for the second message based on at least one vehicle-specific characteristics of the network. Also, an corresponding system as well as a vehicle including such system are provided.

Filtering personally identifiable information from vehicle data

As vehicles collect more data in autonomous or semi-autonomous operation, the collected data such as video, navigation and telemetry data, can containing personally identifiable information (PII). The PII may be governed by specific handling requirements or privacy policies. In order to comply with these requirements and policies a method, system and computer readable memory are provided for determining a location of a vehicle to enable determination of an enforcement policy associated with the location of the vehicle. The enforcement policy defines one or more PII objects that are to be filtered from the vehicle data. The PII objects contained within the vehicle data can then be filtered such that the PII objects are not identifiable. The filtered data can then be stored or transmitted to a remote location.

Storing vehicle data

A computer includes a processor. The processor is programmed to generate, upon detecting a vehicle entry device, a first data block including a hash of identification data for the entry device. The processor is further programmed, upon detecting a trip event, to generate a second data block including a hash of trip event data and a hash linking the second data block to the first data block.

Systems and methods for managing a compromised autonomous vehicle server

Systems and methods for managing a compromised autonomous vehicle server are described herein. A processor may obtain an indication of a first server configured to control an autonomous vehicle being compromised. The autonomous vehicle may have previously been provisioned with a first public key. The first public key may be paired with a first private key. A processor may compile command information. The command information may include a command for the autonomous vehicle and a digital certificate of a second server configured to control the autonomous vehicle in the event of the first server being compromised. The digital certificate may include a second public key and may be signed with the first private key. The command may be signed with a second private key associated with the second server. The second private key may be paired with the second public key.

Method and system for providing security on in-vehicle network

According to an aspect, a method performed by a first controller for providing security for multiple second controllers in an in-vehicle network, includes transmitting an inherent information request to a suspicious controller of the second controllers for inherent information of the suspicious controller, the inherent information request including a certificate assigned to the first controller, and receiving an encrypted inherent information of the suspicious controller from the suspicious controller, the encrypted inherent information having been encrypted with a public key associated with the certificate, and using a private key associated with the certificate for obtaining decrypted inherent information from the encrypted inherent information, and comparing the decrypted inherent information with pre-stored inherent information, and determining the suspicious controller to be an anomalous controller when the decrypted inherent information is different from the pre-stored inherent information.

Aircraft interface device

An aircraft interface device comprising two or more data interface devices, an external data transceiver, a power module, a domain switch, and a controller is disclosed. The two or more data interface devices communicate data, the external data transceiver communicate to an external communication device, and the power module provides power to the two or more data interface devices and the external data transceiver. The two or more data interface devices comprise a first data interface device that communicates with avionics equipment when the first data interface device is powered and a second data interface device that communicates with non-avionics equipment when the second data interface device is powered. The domain switch selectively provides power from the power module to at least one of the two or more data interface devices. The controller provides a data communication path between the selectively powered data interface device and the external data transceiver for the external communication device.

Communication device, abnormality determination device, method, and storage medium

A communication device includes: a first judging section that performs, on received data, a communication abnormality determination based on detection rules; and a setting section that compares a category of data, which the first judging section has determined to represent a communication abnormality during a current trip, with a category of data that the first judging section has determined to represent a communication abnormality during a previous trip, and set a first category of data that has been determined to represent a communication abnormality during each of n trips, wherein n≥2, or a second category of data for which a frequency of having been determined to represent a communication abnormality during the n trips is greater than or equal to a predetermined value, to be a suppression target for which determination thereof as representing a communication abnormality by the first judging section is to be suppressed.

Distributed smart wallet communications platform

A system and method for digital smart wallet communications that operates by managing separately-owned, private blockchains to reduce processing times, eliminate proof of work burdens, and retain blockchain immutable security while allowing protection of confidential information contained on each blockchain. The system and method may further comprise auditability of blockchains, and may be operated on an integrated communications platform that allows seamless interoperability of communication devices across multiple modes of communication, and automates digital smart wallet transactions.

Multi-device vehicle intrusion detection

A vehicle theft-prevention apparatus can include at least one computing device coupled to at least one sensor and a wireless transceiver. The at least one sensor configured to sense measurements proximate to a vehicle. The at least one computing device can be configured to read a plurality of first measurements of the at least one sensor at a predetermined frequency, where the at least one sensor is located in a first position of the vehicle. The at least one computing device can be configured to receive a plurality of second measurements from at least one additional theft-prevention apparatus, where the at least one additional theft-prevention apparatus is located at a second position in the vehicle. The at least one computing device can determine that a person has entered the vehicle based on at least one of: the plurality of first measurements and the plurality of second measurements.