Patent classifications
H04L2012/40215
MESSAGE ID DECODING METHOD
A message ID decoding method is provided for a system comprising multiple components interlinked by a Controller Area Network bus (CAN-bus) through which messages are sent. The method includes acquiring a CAN-bus message data stream including multiple CAN-bus messages, each including a CAN ID indicating a component from which the corresponding CAN-bus message originated; storing the CAN-bus messages in a first datastore; acquiring an electricity consumption signal indicative of the consumption of the component; storing the electricity consumption signal in a second datastore; generating multiple time-stamp bins each corresponding to an interval in time; selecting the CAN ID and a portion of the electricity consumption signal being from the interval in time corresponding to the time-stamp bin; and determining a regression coefficient, R, indicating a level of relatedness between the selected CAN ID and portion, thereby correlating the CAN ID of the selected CAN-bus message with the component.
DETERMINATION DEVICE, DETERMINATION PROGRAM, AND DETERMINATION METHOD
A control unit of a determination device obtains a plurality of pieces of first data and second data, derives determination data based on the first data, specifies, from among a plurality of combinations of identifiers for respectively identifying the pieces of first data and an identifier for identifying the second data, based on the second data and the determination data, a valid combination including the identifiers of valid first data and second data, and an invalid combination including the identifiers of invalid first data or second data, and determines, based on a plurality of identifiers included in the specified invalid combination and a plurality of identifiers included in the valid combination, whether the first data or the second data is invalid.
SYSTEMS, MEDIA, AND METHODS APPLYING MACHINE LEARNING TO TELEMATICS DATA TO GENERATE VEHICLE FINGERPRINT
Described herein are systems and methods for applying machine learning to telematics data to generate a unique vehicle fingerprint by periodically receiving telematics data generated at a plurality of sensors of a vehicle; standardizing the telematics data; aggregating the standardized telematics data; applying a trained machine learning model to embed the aggregated telematics data into a low-dimensional state; and generating a unique vehicle fingerprint, the vehicle fingerprint comprising a static component, a dynamic component, or both a static component and a dynamic component; including iterative repetition to update the dynamic component of the vehicle fingerprint.
Mobile device protocol health monitoring system
A method and apparatus for use in a mobile device telemetry system is disclosed. The method and apparatus relate to aspects in a mobile device protocol health monitoring system. The method and apparatus provide a system to monitor and assess protocol health, log protocol health data and communicate the logs of protocol health data to a remote system. The system may also take corrective actions based upon specific indications of protocol health. The method and apparatus also provides protocol health indications and corrective actions based upon monitoring the message transmission rate. The method and apparatus also provides protocol health indications and corrective actions based upon monitoring for a line disconnect.
In-vehicle network system, fraud-detection electronic control unit, and fraud-detection method
In a fraud-detection method for use in an in-vehicle network system including a plurality of electronic control units (ECUs) that exchange messages on a plurality of networks, a plurality of fraud-detection ECUs each connected to a different one of the networks, and a gateway device, a fraud-detection ECU determines whether a message transmitted on a network connected to the fraud-detection ECU is malicious by using rule information stored in a memory. The gateway device receives updated rule information transmitted to a first network among the networks, selects a second network different from the first network, and transfers the updated rule information only to the second network. A fraud-detection ECU connected to the second network acquires the updated rule information and updates the rule information stored therein by using the updated rule information.
MESSAGE CHAIN-BASED CAN SECURITY SYTEM AND METHOD WITH HASH FUNCTION
There is provided a message chain-based CAN security system with a hash function, including: a hash value generating unit generating a hash value H.sub.(r,ID,i)/H′.sub.(r,ID,i) using a received Hash Reset Key HRK.sub.r and ID to be transmitted or received by the system when an arbitrary node transmits the HRK.sub.r; a CAN message transmitting unit transmitting a CAN message including the hash value H.sub.(r,ID,i)/H′.sub.(r,ID,i); a validity determining unit determining whether H.sub.(r,ID,i) of a CAN message received by a node which has received the CAN message matches a value held by the system; a message receiving and executing unit allowing message reception and executing a command when the validity determining unit determines that the CAN message is valid; and a warning transmitting unit transmitting an intruder detection warning.
Simultaneously testing whether a plurality of electronic devices connected via a communication network correctly handle exceptions
A system for simultaneously testing whether a plurality of electronic devices connected via a communication network correctly handle exceptions. The system includes a communication network, and a plurality of electronic devices and a testing device connected via the communication network. The testing device includes an electronic processor. The electronic processor is configured to send a first status query message to the plurality of electronic devices, send fuzzed data to one or more of the plurality of electronic devices, and send a second status query message to the plurality of the electronic devices. The electronic processor is also configured to, for each electronic device that responds to the first status query message with a valid response and responds to the second status query message with an invalid response or fails to respond to the second status query message, record the electronic device in a failure log.
Security reporting via message tagging
Techniques and screening messages based on tags in an automotive environment, such as, messages communicated via a communication bus, like the CAN bus. Messages can be tagged with either a binary or probabilistic tag indicating whether the message is fraudulent. ECUs coupled to the CAN bus can receive the messages and the message tags and can determine whether to fully consume the message based on the tag.
Fault tolerant modualted trailer braking system
A system and method of controlling individual trailer brakes on a towed trailer supporting numerous fault tolerant behaviors including activating each operational brake when a brake is shorted. System operates in multiple modes where it operates with traditional brake controllers, operates in a degraded braking mode without a brake controller and in the preferred mode it retrieves vehicle information from tow vehicle and then communicates with a brake actuator controller over the trailer brake wire. When braking system includes wheel sensors traditional antilock releases are provided and unlike other braking systems this brake actuator controller can maintain wheel speeds below the trailer speed reducing or eliminating periodic wheel releases. System also diagnoses the mechanical operation of the trailer brakes including; identifying when brake adjustment is required, when brake friction surfaces are degrading, as well as diagnosing sensors, braking signals and brake actuator interfaces.
Clock control to increase robustness of a serial bus interface
An electronic control unit (ECU) includes a processor, a Controller Area Network (CAN) controller, clock gating logic, and security gating logic. The CAN controller having a status and configured to receive data and control signals from the processor, and a clock signal, package the data to create a CAN protocol frame held in at least one transmit buffer, and shift the CAN protocol frame to a CAN transceiver that is configured to transmit the CAN protocol frame to a CAN bus. The security gating logic configured to, in response to the status of the CAN controller being active, inhibit disabling the clock signal.