Patent classifications
H04L12/40104
VEHICLE DATA PROTECTION
A method and apparatus for protecting vehicle data from a vehicle includes identifying the vehicle data to be included in output from a processor that is designated for protection, selecting a digital watermark based on a manner in which the output is subject to at least one of observation or interception, applying the digital watermark to the vehicle data to obtain watermarked output for output from the processor, and communicating a watermark identifier over a communication link of the vehicle to a location external from the vehicle. Detection of the digital watermark in data outside of the vehicle based upon the watermark identifier may be used to determine misuse of the vehicle data.
Unauthorized control suppression method, unauthorized control suppression device, and onboard network system
A method for use in a network system is provided. The network system includes a plurality of electronic controllers that transmits and receives, via a network, a plurality of frames. The plurality of frames includes at least one control frame that instructs predetermined control to an object of control. The method receives, sequentially, the plurality of frames from the network, and determines whether the predetermined control, instructed by the control frame received in the receiving, is to be suppressed, based on a set of frames received in the receiving. The set of frames is received in the receiving within a predetermined period preceding a time of reception of the control frame.
Determining a session key using session data
The various examples are directed to establishing a secure session between a device and a server. The device and the server may establish a session key. The session key may be used for encrypting data. After authenticating the session key, the server may transmit secure session data to the device, and the device may store the secure session data. The server may transmit information for deriving, based on secure session data, the session key to a different server. The device may transmit the secure session data to the server, or to the different server, to re-establish the secure session. The different server may derive, using the information and based on the secure session data, the session key. The different server may re-establish, using the session key, the secure session.
METHOD AND APPARATUS FOR PROVIDING AN INDIVIDUALLY SECURE SYSTEM TO MULTIPLE DISTRUSTING PARTIES
The present application relates to a method and apparatus for intelligent wireless protocol optimization including storing, in a memory, a first customer key and a second customer key, receiving, by a processor, a secret key, decrypting, by the processor, the secret key using a first customer key to extract a master key, provisioning, by the processor, an electronic control unit in response to the master key, and deleting, by the processor, the second customer key in response to the provisioning of electronic control unit in response to the master key.
Using signal rating to identify security critical CAN messages and nodes for efficient implementation of distributed network security features
Systems and methods described herein provide for assigning classifications to signals and corresponding messages for prioritization and transmission across a vehicle CAN bus. The assigned classifications are used to prioritize messages, signals, and nodes of the vehicle CAN bus. The classifications are used to prioritize critical messages and high priority messages that control operations of the vehicle system.
Communication system, communication method, and information storage medium
A communication system, comprising a plurality of industrial machines configured to perform synchronous communication, wherein each of the plurality of industrial machines configured to: encrypt transmission data; transmit the encrypted transmission data to another industrial machine; receive encrypted reception data from the another industrial machine; and decrypt the encrypted reception data.
USING SIGNAL RATING TO IDENTIFY SECURITY CRITICAL CAN MESSAGES AND NODES FOR EFFICIENT IMPLEMENTATION OF DISTRIBUTED NETWORK SECURITY FEATURES
Systems and methods described herein provide for assigning classifications to signals and corresponding messages for prioritization and transmission across a vehicle CAN bus. The assigned classifications are used to prioritize messages, signals, and nodes of the vehicle CAN bus. The classifications are used to prioritize critical messages and high priority messages that control operations of the vehicle system.
METHOD AND DEVICE FOR PROCESSING DATA ASSOCIATED WITH A MESSAGE RECEIVED VIA A COMMUNICATIONS SYSTEM
A computer-implemented method for processing data, which are associated with at least one message received via a communications system, such as a bus system. The method includes: determining a first variable, which characterizes a transmitting time of the at least one message; evaluating the first variable with regard to at least one time frame of possible transmitting times of the at least one message.
Arrangement and method for connecting various integrated circuits in an automotive control system
The invention relates to an arrangement and a method performing data exchange between various integrated circuits, IC, (3,4,5,6,7) in an automotive control system wherein the data are exchanged by a bus and has the object to enable ASIL C/D system coverage and to tie various ICs (clocks, regulators, memory interfaces, sensor signal conditioners, power management ICs etc.) This is solved the data are exchanged by a bus being ASIL C/D compliant and forming a common protocol to exchange information among the integrated circuits (3,4,5,6,7). The method is solved by functions implemented within the bus as setting the frequency of operation; arbitrating roles of the integrated circuits as master or slave device; checking integrity of exchanged data; frame repetition; detecting bus stuck-at failure modes; filtering or denouncing failures and warnings from peripheral devices; detecting remote out of specification local clock; and monitoring and predicting system reliability and profiling maintenance events.
Distributed internet of things terminal system and method based on optical fiber bus RoF
The invention discloses a distributed IoT terminal system and method based on a fiber optic bus RoF. The system comprises a core application part, a pre-channel part, a transmission channel part, an acquisition field part, an acquisition terminal part and a data source. The invention adopts the principle of light-borne ROF to adapt to pan-socialization, decentralization, verticalization, refinement, full traceability, full lifecycle management and governance, instant, real-time, online, interactive and distributed IoT applications. The integrated and integrated application of the invention improves social efficiency and saves social cost. It may be integrated and integrated the application into any application systems, and realized dynamic instant, real-time, online, centimeter level positioning application. It can infer the specific location of the positioning device. The invention combined ROF and RFID and combined high-speed bus and RFID technology to solve the “last mile problem” of RFID and physical offline applications.