Patent classifications
H04L2209/84
METHOD AND APPARATUS FOR PROVIDING AN INDIVIDUALLY SECURE SYSTEM TO MULTIPLE DISTRUSTING PARTIES
The present application relates to a method and apparatus for intelligent wireless protocol optimization including storing, in a memory, a first customer key and a second customer key, receiving, by a processor, a secret key, decrypting, by the processor, the secret key using a first customer key to extract a master key, provisioning, by the processor, an electronic control unit in response to the master key, and deleting, by the processor, the second customer key in response to the provisioning of electronic control unit in response to the master key.
CENTER, INFORMATION REWRITING METHOD, AND NON-TRANSITORY STORAGE MEDIUM
A center, configured to communicate with an OTA master configured to control software updating of an electronic control unit via a first network, includes a processor. The electronic control unit is installed in a vehicle. The processor is configured to store vehicle management information including key information used for authenticating the vehicle, receive an authentication signal from the vehicle via the first network. The authentication signal is signed using a unique key imparted to predetermined equipment installed in the vehicle. The processor is configured to perform authentication of the vehicle based on the vehicle management information and the authentication signal, and when the processor receives the key information from the vehicle, rewrites the vehicle management information stored by the processor based on the key information.
Wireless communications for vehicle collision response
The described technology is generally directed towards wireless communications for vehicle collision response. Devices onboard vehicles can wirelessly exchange information in response to detecting a collision. Public encryption keys can be exchanged, and exchanged information can optionally be encrypted using a received public encryption key. Exchanged information can include vehicle identification information and collision information. The collision information can furthermore be certified using a vehicle's private encryption key.
Enhanced vehicle operation
A computer includes a processor and a memory, the memory storing instructions executable by the processor to collect a digital image that includes a plurality of pixels with a first sensor, input a reference data string, a key data string, and a set of collected data from a second sensor into a permutation generator that outputs a watermark data string, and embed the watermark data string in the digital image at specified pixels in the plurality of pixels.
UWB system
Disclosed is an ultra-wideband (UWB) system and, more particularly, a UWB system capable of optimizing UWB operation for vehicles through hopping. The UWB system includes a memory in which a UWB communication program is embedded and a processor which executes the program. The processor performs UWB time-hopping and frequency-hopping to establish a communication channel.
Secure controller area network (CAN) transceiver
An example operation includes one or more of generating a data frame for transmission via a controller area network (CAN) bus of a transport, the data frame comprising data stored in a plurality of fields, encoding at least one authentication bit into a value within a data field of the generated data frame, wherein the at least one authentication bit comprises a digital signature based on a predefined key for the at least one authentication bit, and transmitting the generated data frame with the at least one authentication bit that comprises the digital signature via the CAN bus.
PROVISIONING OF EVENT-BASED KEYS TO TRANSPORTS
An example operation includes one or more of receiving, by a transport, a key and a functionality associated with an upcoming event from a server, and performing, by the transport, the functionality when the key is verified and the event begins to occur.
PROVISIONING OF EXTERNAL FUNCTIONALITY TO TRANSPORTS
An example operation includes one or more of receiving, at a transport, a key and data associated with an upcoming event from a server, verifying, by the transport, the data associated with the upcoming event based on current data acquired by the transport, responsive to a verification of the data associated with the upcoming event, receiving, at the transport, functionality configured to address the upcoming event, and unlocking the functionality on the transport by the key.
TRANSMISSION OF AUTHENTICATION KEYS
A system for a vehicle includes a computer, a first electronic control module, and a wired vehicle communications network coupling the computer and the first electronic control module. The computer is programmed to transmit authentication keys to the first electronic control module and a plurality of second electronic control modules via the wired vehicle communications network, encrypt a table of the authentication keys using a first key, store the encrypted table, transmit the encrypted table to the first electronic control module via the wired vehicle communications network, and transmit the encrypted table and the first key to a remote server spaced from the wired vehicle communications network.
SecureConnex
Vehicular data is blockchain recorded for immutable storage. Any vehicle (e.g., a car, truck, bus, marine, construction) may generate the telemetry data, the diagnostic data (e.g., OBDII), maintenance data, and the vehicular data. The blocks of data and/or the blockchain may be locally generated by the vehicle and recorded to the blockchain by a hardware processor (such as an engine controller, a chassis controller, or other electronic control module). Additionally or alternatively, the telemetry data, the diagnostic data, maintenance data, and the vehicular data may be wirelessly transmitted from the vehicle (via a network interface to a communications network) for routing to a network destination (such as a server or blockchain peer node) that records the corresponding data to blocks of data within the blockchain. The telemetry data, the diagnostic data, maintenance data, and any other vehicular data is timestamped and immutably recorded for analysis, for verification, and for marketing/sales opportunities.