H04L2209/84

Transport occupant data delivery

An example operation includes one or more of receiving, by a transport, first data from an occupant device proximate the transport, modifying, by the transport, a location-based level of trust related to a type and an interaction of the received first data with the occupant device, and receiving, by the transport, second data based on the modified location-based level of trust and a proximity of the occupant device to the transport.

Using a distributed ledger to determine fault in subrogation

Systems and methods are disclosed with respect to using a blockchain for managing the subrogation claim process related to a vehicle accident, in particular, determining fault as part of the subrogation process. An exemplary embodiment may include receiving an electronic notification of a vehicle collision; receiving sensor data (such as telematics, image, audio, vehicle operational, or other sensor data) related to the vehicle collision; determining a percentage of fault of the vehicle collision for one or more vehicles, vehicle systems, and/or drivers based upon, at least in part, analysis of the sensor data collected; and creating a blockchain for the vehicle collision with one or more links to the sensor image data and an indication of the percentage of fault(s) determined to facilitate blockchain-based claim handling.

SYSTEM AND METHOD FOR SECURE AUTHENTICATION AND AUTHORIZATION
20220231861 · 2022-07-21 · ·

A system and method for secure authentication and authorization between a user device and an Internet of Things (IoT) device that is associated with an asset. The method includes onboarding, using one or more processors that are operatively associated with a distributed ledger, the user device at least based on a public key identity of the user device; onboarding a user with the user device; onboarding an identity of the IoT device and the asset such that association between the asset and the IoT device is endorsed on the distributed ledger; and facilitating the user device to retrieve a first set of data packets representative of any of a relevant electronic authoritative document(s), associated consensus proof(s), and block header(s) from the distributed ledger.

TRANSPORT DISPLAY REPRESENTATION FOR EXTERNAL DEVICE
20220227228 · 2022-07-21 ·

An example operation includes one or more of displaying, by a transport, a representation of an external device proximate to the transport, receiving, by the transport, input via the representation, transmitting, by the transport, the input to the external device, and causing, by the transport, the external device to perform an action related to the input.

ONBOARD VEHICLE DIGITAL IDENTIFICATION TRANSMISSION
20220217134 · 2022-07-07 ·

A computer-implemented method includes: establishing a connection between a user device of a user and a system onboard a vehicle being driven by the user; requesting access, through the established connection, to user information on the user device; in response to a grant of access, retrieving at least a portion of the user information from the user device, the portion of user information including a digital identification document of the user that had been issued by an entity after having vetted the user, the digital identification document including a digital biometric of the user as well as a digital watermark indicating the issuing entity; and retaining, on the system onboard the vehicle, data encoding the digital identification document of the user on the vehicle such that when the vehicle is inspected by a third-party agent, the digital identification document of the user is presented to the third-party agent.

SYSTEM AND METHOD FOR A VEHICLE NETWORK

An onboard communication network of a vehicle is monitored to detect a plurality of available messages that include respective cipher-based message authentication codes (CMAC) and that were identified as eligible messages based on having an information entropy greater than a specified threshold. A first message is selected from the plurality of available messages. The CMAC of the selected message is input into a random number generator that outputs a random number seeded by the CMAC of the selected message. Then the random number is provided.

Provisioning of external functionality to transports

An example operation includes one or more of receiving, at a transport, a key and data associated with an upcoming event from a server, verifying, by the transport, the data associated with the upcoming event based on current data acquired by the transport, responsive to a verification of the data associated with the upcoming event, receiving, at the transport, functionality configured to address the upcoming event, and unlocking the functionality on the transport by the key.

VEHICLE COMPUTING DEVICE AUTHENTICATION

A vehicle communication network is monitored to detect a plurality of electronic control units (ECUs). Upon identifying a new ECU in the plurality of ECUs, a highest ECU trip counter is determined from the plurality of ECUs. A global trip counter stored in the memory is updated based on the highest ECU trip counter. The updated trip global trip counter is greater than the highest ECU trip counter. Then a replacement synchronization message is provided to the plurality of ECUs on the vehicle communication network. The replacement synchronization message includes the updated global trip counter.

Point-of-interest-based anti-vehicle theft systems and processes for using the same

A sensing device can include at least one sensor, positioning circuitry, a transceiver, and a computing device in communication with the at least one sensor, the positioning circuitry, and the transceiver. The computing device can determine a location of a vehicle via the positioning circuitry. The computing device can determine that a point of interest (POI) associated with a predefined category of POIs corresponds to the location. The computing device, via the transceiver, can determine that a person is moving away from the vehicle based on a measurement associated with a remote device. The computing device can enter into an armed mode in response to the determinations. The computing device can detect an intrusion into a vehicle while in the armed mode based at least in part on measurements from the at least one sensor. The computing device can generate an alarm in response to the intrusion.

System and method for secure authentication and authorization
11463266 · 2022-10-04 · ·

A system and method for secure authentication and authorization between a user device and an Internet of Things (IoT) device that is associated with an asset. The method includes onboarding, using one or more processors that are operatively associated with a distributed ledger, the user device at least based on a public key identity of the user device; onboarding a user with the user device; onboarding an identity of the IoT device and the asset such that association between the asset and the IoT device is endorsed on the distributed ledger; and facilitating the user device to retrieve a first set of data packets representative of any of a relevant electronic authoritative document(s), associated consensus proof(s), and block header(s) from the distributed ledger.