H04W4/48

Vehicle-based media system with audio ad and visual content synchronization feature
11581969 · 2023-02-14 · ·

In one aspect, an example method to be performed by a vehicle-based media system includes (a) receiving audio content; (b) causing one or more speakers to output the received audio content; (c) using a microphone of the vehicle-based media system to capture the output audio content; (d) identifying reference audio content that has at least a threshold extent of similarity with the captured audio content; (e) identifying visual content based at least on the identified reference audio content; and (f) outputting, via a user interface of the vehicle-based media system, the identified visual content.

METHOD AND SYSTEM FOR DATA EXCHANGE ON A NETWORK TO ENHANCE SECURITY MEASURES OF THE NETWORK, VEHICLE COMPRISING SUCH SYSTEM
20230037778 · 2023-02-09 ·

A method for data exchange on a communication network, operating according to a protocol, and including a transmission bus, a first node and a second node. The first node carries out the steps of: constructing a first and a second data frame which transport first and second information data; calculating a first message authentication code as a function of the first and the second information data; constructing a third data frame which transports the first message authentication code; transmitting all of the data frames thus constructed. The second node carries out the steps of: receiving the first, the second and the third data frames; extracting the first and the second information data and the first message authentication code; calculating a second message authentication code as a function of the first and the second information data extracted; comparing the message authentication code extracted with the message authentication code calculated in order to verify the identity thereof.

WAYFINDING ASSISTANCE SYSTEM FOR VISUALLY-IMPAIRED PASSENGERS
20230039479 · 2023-02-09 · ·

Systems and methods provide technology for wayfinding assistance for visually-impaired passengers, including short-range transmitters distributed within a passenger cabin of an aircraft, a transit vehicle or a vessel, each short-range transmitter located proximate to a respective waypoint in the passenger cabin to transmit a signal identifying the respective waypoint in the passenger cabin, and a client application to, responsive to passing within a range of one of the plurality of short-range transmitters, receive a first transmission from the short-range transmitter and emit one or more of a first audible signal or a first haptic signal, based on the first transmission, as wayfinding assistance to a user of the client device. The technology can also include a mid-range transmitter located proximate to a service area in the passenger cabin, to transmit a signal providing at least one of a status of or a location of the service area.

WAYFINDING ASSISTANCE SYSTEM FOR VISUALLY-IMPAIRED PASSENGERS
20230039479 · 2023-02-09 · ·

Systems and methods provide technology for wayfinding assistance for visually-impaired passengers, including short-range transmitters distributed within a passenger cabin of an aircraft, a transit vehicle or a vessel, each short-range transmitter located proximate to a respective waypoint in the passenger cabin to transmit a signal identifying the respective waypoint in the passenger cabin, and a client application to, responsive to passing within a range of one of the plurality of short-range transmitters, receive a first transmission from the short-range transmitter and emit one or more of a first audible signal or a first haptic signal, based on the first transmission, as wayfinding assistance to a user of the client device. The technology can also include a mid-range transmitter located proximate to a service area in the passenger cabin, to transmit a signal providing at least one of a status of or a location of the service area.

Detecting manipulation of data on a can bus
11595412 · 2023-02-28 · ·

A method of detecting manipulation of data on a Controller Area Network (CAN) bus, and a device performing the method. In an aspect, the method includes detecting manipulation of data on a CAN bus to which the device is connected. The method comprises detecting that bus impedance is below a threshold bus impedance value, detecting whether or not CAN node arbitration currently may occur on the CAN bus upon detecting that the bus impedance is below the threshold bus impedance value, and if not determining that an attempt to manipulate data on the CAN bus has occurred.

Method and apparatus for enhancing driver situational awareness

Aspects of the subject disclosure may include, for example, determining, by a system comprising a processor, a driver profile according to a driver identity for a driver of a vehicle, selecting a driver-specific enforcement scenario for the vehicle according to the driver profile and traffic enforcement information that is associated with a vehicle location, and presenting an in-vehicle alert to convey the driver-specific enforcement scenario to the driver. Other embodiments are disclosed.

Method and apparatus for enhancing driver situational awareness

Aspects of the subject disclosure may include, for example, determining, by a system comprising a processor, a driver profile according to a driver identity for a driver of a vehicle, selecting a driver-specific enforcement scenario for the vehicle according to the driver profile and traffic enforcement information that is associated with a vehicle location, and presenting an in-vehicle alert to convey the driver-specific enforcement scenario to the driver. Other embodiments are disclosed.

SECURITY SYSTEM AND METHOD FOR PROTECTING A VEHICLE ELECTRONIC SYSTEM
20180004964 · 2018-01-04 ·

Security system for protecting a vehicle electronic system by selectively intervening in the communications path in order to prevent the arrival of malicious messages at ECUs, in particular at the safety critical ECUs. The security system includes a filter which prevents illegal messages sent by any system or device communicating over a vehicle communications bus from reaching their destination. The filter may, at its discretion according to preconfigured rules, send messages as is, block messages, change the content of the messages, request authentication or limit the rate such messages can be delivered, by buffering the messages and sending them only in preconfigured intervals.

Information Sharing System, Computer, and Information Sharing Method
20180006810 · 2018-01-04 ·

It is provided an information sharing system, comprising a server, and an in-vehicle system. The server includes: a first storage part; a first key generation part configured to generate a first private key and a first public key, if keys can be exchanged with the in-vehicle system; and a signature generation part configured to generate a signature value of the first public key using a server private key. The in-vehicle system includes: a second storage part configured to store a public key certificate including a server public key; a signature verification part configured to verify the first public key and a signature value received from the server, using a public key certificate; and a second key generation part configured to generate a second private key and a second public key, if a combination of the first public key and the signature value is correct as a result of the verification.

SYSTEM AND METHOD FOR DETECTION AND PREVENTION OF ATTACKS ON IN-VEHICLE NETWORKS

Systems and methods for detection of attacks on a communication authentication layer of an in-vehicle network, including determining, by at least one network node, at least one attack attempt on the communication authentication layer of the in-vehicle network, wherein the determination is carried out by identifying anomalies in at least one of messages, data and metadata directed to the communication authentication layer, and selecting, by the at least one network node, a response corresponding to the determined attack attempt from at least one of modification of parameter values corresponding to a security protocol, a failsafe response, and rejection of messages identified as anomalies.