H04W12/069

Trusted service manager (TSM) architectures and methods
11521194 · 2022-12-06 · ·

A client device comprises a first secure element and a second secure element. The first secure element comprises a first computer-readable medium having a payment application comprising instructions for causing the client device to initiate a financial transaction. The second secure element comprises a second computer-readable medium having a security key, a payment instrument, stored authentication data and instructions for generating a secure payment information message responsive to the payment application. The secure payment information message comprises the payment instrument and is encrypted in accordance with the security key.

Trusted service manager (TSM) architectures and methods
11521194 · 2022-12-06 · ·

A client device comprises a first secure element and a second secure element. The first secure element comprises a first computer-readable medium having a payment application comprising instructions for causing the client device to initiate a financial transaction. The second secure element comprises a second computer-readable medium having a security key, a payment instrument, stored authentication data and instructions for generating a secure payment information message responsive to the payment application. The secure payment information message comprises the payment instrument and is encrypted in accordance with the security key.

V2X communication device and secured communication method thereof
11570621 · 2023-01-31 · ·

Disclosed is a method for secured communication by a V2X communication device. A method for secured communication by a V2X communication device comprises the steps of: receiving a message on the basis of V2X communication; extracting adaptive certificate pre-distribution (ACPD) target information when the message includes the ACPD target information; pre-authenticating a short-term certificate; and transferring the pre-authenticated short-term certificate so that the pre-authenticated short-term certificate can be broadcasted at a predicted position.

V2X communication device and secured communication method thereof
11570621 · 2023-01-31 · ·

Disclosed is a method for secured communication by a V2X communication device. A method for secured communication by a V2X communication device comprises the steps of: receiving a message on the basis of V2X communication; extracting adaptive certificate pre-distribution (ACPD) target information when the message includes the ACPD target information; pre-authenticating a short-term certificate; and transferring the pre-authenticated short-term certificate so that the pre-authenticated short-term certificate can be broadcasted at a predicted position.

Devices and methods for pairing between a wireless control device and an electronic unit

A method for operating a wireless control device includes the starting up of a control circuit following the actuation, by a user, of a control unit coupled to an energy harvesting device to recharge an energy reserve which electrically powers the control device; the sending of a control message including a control command; the comparison of the elapsed time since the starting up of the control circuit with a first threshold value; when the elapsed time is greater than or equal to the first threshold value, the sending of a pairing request message to the electronic unit.

Devices and methods for pairing between a wireless control device and an electronic unit

A method for operating a wireless control device includes the starting up of a control circuit following the actuation, by a user, of a control unit coupled to an energy harvesting device to recharge an energy reserve which electrically powers the control device; the sending of a control message including a control command; the comparison of the elapsed time since the starting up of the control circuit with a first threshold value; when the elapsed time is greater than or equal to the first threshold value, the sending of a pairing request message to the electronic unit.

Pseudonym credential configuration method and apparatus

A pseudonym credential configuration method and apparatus are provided. The method includes: receiving an identifier of a terminal device and information about N to-be-requested pseudonym credentials from the terminal device, sending N second request messages to a pseudonym credential generation server, and storing a tag of each second request message in association with the identifier of the terminal device in the registration server, so that the registration server can obtain, based on the tag, the identifier that is of the terminal device and that is associated with the tag; and generating N pseudonym credentials. The pseudonym credential generated in this application may enable a behavior investigation server to learn of a real identity of the terminal device.

Secure vehicle communications architecture for improved blind spot and driving distance detection

Disclosed are techniques for improving an advanced driver-assistance system (ADAS) using a secure channel area. In one embodiment, a method is disclosed comprising establishing a secure channel area extending from at least one side of a first vehicle; detecting a presence of a second vehicle in the secure channel area; establishing a secure connection with the second vehicle upon detecting the presence; exchanging messages between the first vehicle and the second vehicle, the messages including a position and speed of a sending vehicle; taking control of a position and speed of the first vehicle based on the contents of the messages; and releasing control of the position and speed of the first vehicle upon detecting that the secure connection was released.

Secure vehicle communications architecture for improved blind spot and driving distance detection

Disclosed are techniques for improving an advanced driver-assistance system (ADAS) using a secure channel area. In one embodiment, a method is disclosed comprising establishing a secure channel area extending from at least one side of a first vehicle; detecting a presence of a second vehicle in the secure channel area; establishing a secure connection with the second vehicle upon detecting the presence; exchanging messages between the first vehicle and the second vehicle, the messages including a position and speed of a sending vehicle; taking control of a position and speed of the first vehicle based on the contents of the messages; and releasing control of the position and speed of the first vehicle upon detecting that the secure connection was released.

Vehicle digital key cloud storage

A vehicle includes a wireless transceiver; and one or more controllers, programmed to receive, via the wireless transceiver, a hailing instruction that identifies a user to ride in the vehicle, the hailing instruction including an identifier of a mobile device of the user, responsive to receiving a key from the mobile device via a wireless connection between the mobile device and the wireless transceiver, associate the key with the identifier, and send the key and the identifier as an associated pair to a server via the wireless transceiver.