Patent classifications
H04L2209/84
Anonymous collection of data from a group of entitled members
A method for collecting data from a group of entitled members. The method may include receiving, by a collection unit, a message and a message signature; validating, by the collection unit, whether the message was received from any of the entitled members of the group, without identifying the entitled member that sent the message; wherein the validating comprises applying a second plurality of mathematical operations on first group secrets, second group secrets and a first part of the message signature; and rejecting, by the collection unit, the message when validating that the message was not received from any entitled member of the group.
Security monitoring apparatus and method for vehicle network
A security monitoring apparatus and method for a vehicle network are provided. The apparatus transmits an indicator and an encryption key to a plurality of electronic control units via the controller area network interface. The apparatus receives a response code from each electronic control unit via the controller area network interface, wherein each of the response codes is generated by a serial number of each electronic control unit and the encryption key via a hash algorithm. The apparatus compares the response code returned by each electronic control unit according to a list, the encryption key and the hash algorithm to determine whether each electronic control unit correctly returns the response code. The apparatus determines to generate an alert signal when one of the electronic control units does not correctly return the response code.
Vehicle communication system and method of security communication therefor
A security communication method of a client ECU included in a vehicle Ethernet network includes transmitting a first message generated based on a first random number generated by the client ECU, first security version information of the client ECU, and a symmetric key pre-shared with a server ECU, to the server ECU, receiving a second message generated based on a second random number generated by the server ECU, second security version information of the server ECU, and the symmetric key in response to the first message, from the server ECU, when successfully verifying the second message, storing the second random number in a memory of the client ECU, transmitting a third message to the server ECU and generating a session key based on the first random number, the second random number, and the symmetric key, and transmitting a fourth message encrypted using the session key to the server ECU.
Providing media based on profile sharing
An example operation may include one or more of detecting, by a transport, a service selection by a transport occupant inside the transport, accessing, by the transport, a profile of the transport occupant on a remote storage, determining, by the transport, if the profile of the transport occupant contains a subscription for the service selection, responsive to the profile of the transport occupant not having the subscription, acquiring permissions to use the service selection from a plurality of transports having profiles connected to the profile of the transport occupant, and providing the service selection to the transport occupant based on the permissions.
Authentication system
An authentication system includes: ECUs constituting on-vehicle network and server device communicating with the ECU. The ECU stores ID and encryption key set individually to the ECU and used for authenticating data exchanged between the ECUs. The server device stores the ID and encryption key of the ECU. The ECU includes: first CPU configured to perform: generating authentication data; generating authentication code by encrypting the authentication data using the encryption key; and transmitting the ID, authentication data, and authentication code to the server device. The server device includes: second CPU configured to perform: acquiring the ID transmitted from the ECU; retrieving the encryption key of ECU corresponding to the ID acquired; acquiring the authentication data and authentication code transmitted from the ECU; and authenticating the ECU using the encryption key retrieved.
Method of secrets injection for autonomous vehicles
Systems and methods are provided for distributing secrets and sensitive information for autonomous vehicles. In particular, systems and methods are provided for automating the acquisition of secrets and sensitive information for autonomous vehicles. Secrets, such as certificates, passwords, storage account keys, shared access signatures, encryption keys, and decryptions keys, are securely distributed to autonomous vehicles for use by various services and applications in the autonomous vehicle.
TRANSMISSION OF AUTHENTICATION KEYS
A computer includes a processor and a memory storing instructions executable by the processor to, upon receiving an authorization message, transmit a plurality of new authentication keys to a respective plurality of control modules, the memory including an expiration time for the authorization message; update a listing of the control modules with respective statuses of the transmissions of the respective new authentication keys to the respective control modules, wherein each status is one of successful or unsuccessful; upon at least one status being unsuccessful, prevent the authorization message from expiring at the expiration time; after preventing the authorization message from expiring, retransmit the respective new authentication keys to each control module for which the respective status is unsuccessful; and then expire the authorization message.
Geolocation Based Vehicle Access Systems And Methods
Geolocation based vehicle access systems and methods are disclosed herein. An example method includes receiving a blockchain ledger from a vehicle operating in a controlled area, the blockchain ledger including time-stamped, location and vehicle data. The method also includes comparing the time-stamped, location and vehicle data to database records that have control access parameters for controlled areas. In addition, the method includes generating a notice when the time-stamped, location and vehicle data matches control access parameters for the controlled area, which is one of the controlled areas. More so, the method includes providing the notice to the vehicle or a user of the vehicle.
FAULT TOLERANT PROVISIONING VERIFICATION FOR CRYPTOGRAPHIC KEYS
The present application relates to a method and apparatus for providing fault tolerant provisioning verification for cryptographic keys including receiving, via an interface, a first security key, a second security key, and a first verification data generated in response to the first security key and the second security key, coupling, by a processor, the first security key and the second security key to an electronic controller, receiving, by the processor, a second verification data generated by the electronic controller in response to the first security key and the second security key, and marking, by the processor, the controller as provisioned in response to the first verification data matching the second verification data.
SECURELY TRANSMITTING COMMANDS TO VEHICLE DURING ASSEMBLY
A system includes a control module and a local server. The server is programmed to transmit a command to perform an operation to a plurality of vehicles including a vehicle including the control module. The command including a digital signature that is common across the vehicles. The control module is programmed to receive a temporary value; receive the command; decrypt the digital signature in the command with the temporary value; upon verifying the decrypted digital signature, perform the operation; and upon a metric incrementing to a threshold value, prevent decryption of the digital signature with the temporary value.