H04L12/40104

DIAGNOSTIC OVER IP AUTHENTICATION

A system comprises a computer including a processor and a memory, the memory including instructions such that the processor is programmed to: receive a data frame including data representing a unified diagnostic services (UDS) request, wherein the data frame includes a hash value and a cipher-based message authentication code (CMAC); calculate an authentication CMAC based on the hash value; compare the CMAC with the authentication CMAC; and transmit control data to a communication module when the CMAC matches the authentication CMAC.

Data transmission system

A marine-type communication device that reads data from a data bus, dynamically creates new data channels for a plurality of operational systems and performs a volatility assessment to determine when to save the data for transmission to a cloud network and when to transmit the data to the cloud network.

BIDIRECTIONAL INTERFACE CONFIGURATION FOR MEMORY
20220012193 · 2022-01-13 ·

Apparatuses and methods can be related to configuring interface protocols for memory. An interface protocol can define the commands received by a memory device utilizing transceivers, receivers, and/or transmitters of an interface of a memory device. An interface protocol used by a memory device can be implemented utilizing a decoder of signals provided via a plurality of transceivers of the memory device. The decoder utilized by a memory device can be selected by setting a mode register of the memory device.

Switch network architecture

One embodiment describes a network system. The system includes a primary enclosure including a network switch system that includes a plurality of physical interface ports. A first one of the plurality of physical interface ports is to communicatively couple to a network. The system further includes a sub-enclosure comprising a network interface card (NIC) to which a computer system is communicatively coupled and a downlink extension module (DEM) that is communicatively coupled with the NIC and a second one of the plurality of physical interface ports of the network switch system to provide network connectivity of the computer system to the network via the network switch system.

FAULT TOLERANT DISTRIBUTED COMPUTING

Methods, systems, and techniques for fault tolerant distributed computing. At least three fault tolerant messages are generated. The generating involves obtaining a first initial message identifier; mapping the initial message identifier to at least three different fault tolerant identifiers; and using the at least three different fault tolerant identifiers to identify the at least three fault tolerant messages. The at least three fault tolerant messages are then transmitted along at least one communication channel. The at least one communication channel may be a Controller Area Network (CAN) bus and the initial message identifier may be a CAN identifier.

Data Transmission System

A marine-type communication device that reads data from a data bus, dynamically creates new data channels for a plurality of operational systems and performs a volatility assessment to determine when to save the data for transmission to a cloud network and when to transmit the data to the cloud network.

Variable multiplexer for vehicle communication bus compatibility

Disclosed are systems, methods, and non-transitory computer-readable media for a variable multiplexer for vehicle communication bus compatibility. A device includes a variable multiplexer that can be electronically configured to a desired pinout configuration to provide compatibility with multiple vehicles. For example, the variable multiplexer may be electronically configured based on a pinout configuration used by the vehicle to connect pins in the device to the corresponding pins on the data link connector that provide the same specified function. The device may therefore use a single standardized cable with vehicles using a variety of pinout configurations.

Systems and methods for asset type fingerprinting and data message decoding

A method for by an asset tracking system is provided. An example method includes receiving a first plurality of data messages from an asset coupled to the asset tracking system and attempting to identify an asset type fingerprint based on the first plurality of messages. In response to failing to identify an asset type fingerprint based on the first plurality of messages, the example method further includes requesting a determined asset type fingerprint for the asset from an asset data analysis system, providing access to the first plurality of data messages to the asset data analysis system, receiving the determined asset type fingerprint for the asset from the asset data analysis system, and obtaining asset information from the asset by decoding a second plurality of data messages received from the asset in accordance with a set of signal definitions linked to the determined asset type fingerprint.

Method and device for processing data associated with a message received via a communications system

A computer-implemented method for processing data, which are associated with at least one message received via a communications system, such as a bus system. The method includes: determining a first variable, which characterizes a transmitting time of the at least one message; evaluating the first variable with regard to at least one time frame of possible transmitting times of the at least one message.

Method and apparatus for providing an individually secure system to multiple distrusting parties

The present application relates to a method and apparatus for intelligent wireless protocol optimization including storing, in a memory, a first customer key and a second customer key, receiving, by a processor, a secret key, decrypting, by the processor, the secret key using a first customer key to extract a master key, provisioning, by the processor, an electronic control unit in response to the master key, and deleting, by the processor, the second customer key in response to the provisioning of electronic control unit in response to the master key.