H04L2209/84

Gateway device, vehicle network system, and transfer method

A gateway connected to a bus, a bus, and the like used by a plurality of electronic control units for communication includes a frame communication unit that receives a frame, a transfer control unit that removes verification information used to verify a frame from the content of the frame received by the frame communication unit and transfers the frame to a destination bus or that adds verification information to the content of the frame and transfers the frame to the destination bus, and the like.

Transceiver system
11533612 · 2022-12-20 · ·

A first-transceiver for communicating with a second-transceiver is disclosed. The first and second-transceivers are vehicle-access-system transceivers. The transceivers include a cipher-module configured to generate a cipher-code using a cipher key and an input value, an encryption-module configured to generate encrypted-payload-data from payload-data using the cipher-code, a hashing-module configured to hash the payload-data to generate hashed-payload-data using the cipher-code, and a transmitter configured to transmit the encrypted-payload-data and the hashed-payload-data to the second-transceiver. A vehicle including the first-transceiver is also disclosed. Access to one or more systems of the vehicle are controlled in accordance with a validation state.

Method for operating a touch-sensitive, planar input device of a complete device, and complete device

An approach for operating at least one touch-sensitive, flat input device of a complete device, the input device being connected via a message-based bus connection to a control device of the complete device, and messages containing touch datasets describing touch data events being transmitted to the control device, which evaluates the messages for input information for an application program implemented by the control device, wherein when a security function in the control device that queries sensitive input information is accessed, the touch datasets are transmitted from the input device to the control apparatus via the bus connection in encrypted form until the associated input process has ended.

Processing of requests

An example operation may include one or more of receiving, by a node, a request for a transport, determining, by the node, an availability of the requested transport, responsive to the availability, broadcasting the request including a suggested value to a plurality of nodes, receiving agreements from the plurality of the nodes, and recording a completed request on a remote storage.

COMMUNICATION DEVICES AND OPERATING METHODS

A communication device is provided, comprising: an ultra-wideband device configured to establish a communication session with an external communication device; a secure element configured to generate a session key for use in said communication session and an authentication key derived from said session key; a processing unit configured to execute an application; wherein the secure element is further configured to transfer the session key and the authentication key to the UWB device; wherein the UWB device is configured to add, upon or after receiving data for use by said application, a cryptographic tag to said data; wherein the processing unit is configured to receive said data and the cryptographic tag, and to forward said data and cryptographic tag to the secure element; wherein the secure element is configured to verify said cryptographic tag and to return, upon or after a positive verification of the cryptographic tag, a signed confirmation.

DEVICE ESTABLISHING SECURITY SESSION FOR V2X SERVICE
20220399998 · 2022-12-15 · ·

Provided is a device establishing a security session for a vehicle-to-everything (V2X) service. The device transmits a ping request message requesting establishment of the security session to a V2X server. The ping request message includes a certificate based on the Institute of Electrical and Electronics Engineers (IEEE) 1609.2 and a session identifier (ID) for the security session. The device receives, from the V2X server, a ping response message as a response to the ping request message.

DYNAMIC ROUTE RECOMMENDATION BASED ON MOBILE COMPUTATION

In an approach to improve mobile computation while traveling by dynamically generating one or more routes base on computing resource requirements of one or more endpoint devices. Embodiments identify, in real time, a plurality of autonomous vehicles, wherein the plurality of autonomous vehicles are traveling along a common route. Further embodiments, adjust, in real time, relative positions and speeds of the plurality of autonomous vehicles to maintain the plurality of autonomous vehicles within a predetermined geographic area while traveling along the common route, and wherein the predetermined geographic area is sufficient to collectively provide an amount of edge computing resources to satisfy one or more computing resource requirements of the one or more endpoint devices located within a first autonomous vehicle. Additionally, embodiments adjust, in real time, a route of the first autonomous vehicle based on the common route of the plurality of autonomous vehicles providing the edge computing resources.

Enhanced secure onboard communication for CAN

According to certain general aspects, the present embodiments relate generally to securing communication between ECUs. Example implementations can include a method of securely transmitting Controller Area Network (CAN) protocol frames via a CAN controller.

Systems and methods for delayed-message attack mitigation
11528153 · 2022-12-13 · ·

A computer-implemented method comprising: establishing, by an operation device, a wireless communication with a remote device; authenticating, by the operation device, the wireless communication with the remote device; receiving, at the operation device, a first command to perform a first operation; establishing a first maximum delay period using an estimated time delay, wherein the estimated time delay comprises an authentication delay, an encryption delay, or a combination thereof; determining, by the operation device, that the first command is received within a first maximum delay period; performing, by the operation device, the first operation; receiving, at the operation device, a second command to perform a second operation; establishing a second maximum delay period using the estimated time delay; determining, by the operation device, that the second command is received within a second maximum delay period; and performing, by the operation device, the second operation instructed in the second command.

Cryptographic Security Mechanism for Groupcast Communication
20220393877 · 2022-12-08 ·

The present disclosure provides a security mechanism to mitigate the risk of trackability of a UE engaged in groupcast communication. The security mechanism makes use of cryptographic functions and thus provides a cryptographic-grade protection for groupcast communications. The security mechanism can be implemented without any additional signaling for even additional parameters in existing signaling message.