Patent classifications
B60R2325/40
Secure layered autonomous vehicle access
A vehicle having at least one vehicle access secured by a first lock and at least one secure area secured by a second lock. The vehicle may also have a receiver configured to receive a command from a remote computing system to unlock the vehicle access or the secure area.
REMOTE VEHICLE SYSTEM CONFIGURATION, CONTROL, AND TELEMATICS
A vehicle control system (VCS) includes external communication interfaces, such as a Bluetooth interface, for communicating with a user communication and control device, such as a smart phone or a tablet. The user is enabled to operate certain features of the vehicle, such as the remote start, power locks/trunk, climate control, and security features, through the smart phone. The VCS may also communicate with a remote server via the user's smartphone, for example, providing telematics data and receiving service reminders For display to the user on the smartphone, the VCS, or a display built into the vehicle. The VCS may be custom installed in the vehicle using, the user's or the installer's smartphone, without a physical connection from the VCS to the smartphone.
Method for activation of at least one security function of a security system of a vehicle
The invention relates to a method (100) for a security system (200) of a vehicle (1), in particular for a keyless activation of at least one security function of the vehicle (1).
Vehicle network intrusion detection system (IDS) using vehicle state predictions
In one embodiment, a processor of a vehicle predicts a state of the vehicle using a behavioral model. The model is configured to predict the state based in part on one or more state variables that are available from one or more sub-systems of the vehicle and indicative of one or more physical characteristics of the vehicle. The processor computes a representation of a difference between the predicted state of the vehicle and a measured state of the vehicle indicated by one or more state variables available from the one or more sub-systems of the vehicle. The processor detects a malicious intrusion of the vehicle based on the computed representation of the difference between the predicted and measured states of the vehicle exceeding a defined threshold. The processor initiates performance of a mitigation action for the detected intrusion, in response to detecting the malicious intrusion of the vehicle.
SECURE LAYERED AUTONOMOUS VEHICLE ACCESS
A vehicle having at least one vehicle access secured by a first lock and at least one secure area secured by a second lock. The vehicle may also have a receiver configured to receive a command from a remote computing system to unlock the vehicle access or the secure area.
Remote vehicle system configuration, control, and telematics
A vehicle control system (VCS) includes external communication interfaces, such as a Bluetooth interface, for communicating with a user communication and control device, such as a smart phone or a tablet. The user is enabled to operate certain features of the vehicle, such as the remote start, power locks/trunk, climate control, and security features, through the smart phone. The VCS may also communicate with a remote server via the user's smartphone, for example, providing telematics data and receiving service reminders for display to the user on the smartphone, the VCS, or a display built into the vehicle. The VCS may be custom installed in the vehicle using the user's or the installer's smartphone, without a physical connection from the VCS to the smartphone.
REMOTE VEHICLE SYSTEM CONFIGURATION, CONTROL, AND TELEMATICS
A vehicle control system (VCS) includes external communication interfaces, such as a Bluetooth interface, for communicating with a user communication and control device, such as a smart phone or a tablet. The user is enabled to operate certain features of the vehicle, such as the remote start, power locks/trunk, climate control, and security features, through the smart phone. The VCS may also communicate with a remote server via the user's smartphone, for example, providing telematics data and receiving service reminders for display to the user on the smartphone, the VCS, or a display built into the vehicle. The VCS may be custom installed in the vehicle using the user's or the installer's smartphone, without a physical connection from the in VCS to the smartphone.
Secure layered autonomous vehicle access
A vehicle having at least one vehicle access secured by a first lock and at least one secure area secured by a second lock. The vehicle may also have a receiver configured to receive a command from a remote computing system to unlock the vehicle access or the secure area.
SYSTEMS AND METHODS FOR DETECTION OF MALICIOUS ACTIVITY IN VEHICLE DATA COMMUNICATION NETWORKS
There is provided a method for identifying malicious activity that changes the integrity of data sent out from a vehicle, comprising: intercepting, by an output data monitoring agent that monitors data sent out from the vehicle to an external receiving computing unit using a communication interface in communication with a network; intercepting, by at least one sensor data monitoring agent that monitors sensor data outputted by at least one sensor associated with the vehicle; monitoring the integrity of the data sent out by the vehicle by analyzing the data collected by the output data monitoring agent with the sensor data collected by the at least one sensor data monitoring agent to identify a mismatch; and identifying an indication of malicious activity that changed the data sent out from the vehicle relative to the data sensed by the at least one sensor.
CONTROL SYSTEM AND CONTROL METHOD FOR CONSTRUCTION MACHINERY
A control system for construction machinery includes a smart key configured to store a plurality of authentication codes and activate any one of the authentication codes, and a plurality of construction machines including a plurality of smart key modules mounted thereon respectively, the smart key modules communicating wirelessly with the smart key and having respective registration authentication codes which match with the authentication codes respectively. The construction machine including the smart key module having the registration authentication code which matches with the activated authentication code is controlled by the smart key.