B60R2325/40

Systems and methods for detection of malicious activity in vehicle data communication networks

There is provided a method for identifying malicious activity that changes the integrity of data sent out from a vehicle, comprising: intercepting, by an output data monitoring agent that monitors data sent out from the vehicle to an external receiving computing unit using a communication interface in communication with a network; intercepting, by at least one sensor data monitoring agent that monitors sensor data outputted by at least one sensor associated with the vehicle; monitoring the integrity of the data sent out by the vehicle by analyzing the data collected by the output data monitoring agent with the sensor data collected by the at least one sensor data monitoring agent to identify a mismatch; and identifying an indication of malicious activity that changed the data sent out from the vehicle relative to the data sensed by the at least one sensor.

Detecting an event and automatically obtaining video data

A server device obtains, from a primary device associated with a first vehicle, event data concerning an event, video data concerning the event, and/or location data concerning a location of the first vehicle. The server device processes the event data to determine a type of the event, and determines, based on the type of the event and the location data, a proximity zone around the location of the first vehicle. The server device determines additional devices within the proximity zone, where each additional device is associated with a different vehicle. The server device sends, to the additional devices, a message requesting additional video data concerning the event, and obtains the additional video data from at least one additional device. The server device performs, based on relevant event information based on the event data, the video data, and the additional video data, an action concerning the event.

Remote vehicle system configuration, control, and telematics
10720045 · 2020-07-21 · ·

A vehicle control system (VCS) includes external communication interfaces, such as a Bluetooth interface, for communicating with a user communication and control device, such as a smart phone or a tablet. The user is enabled to operate certain features of the vehicle, such as the remote start, power locks/trunk, climate control, and security features, through the smart phone. The VCS may also communicate with a remote server via the user's smartphone, for example, providing telematics data and receiving service reminders for display to the user on the smartphone, the VCS, or a display built into the vehicle. The VCS may be custom installed in the vehicle using the user's or the installer's smartphone, without a physical connection from the VCS to the smartphone.

DETECTING AN EVENT AND AUTOMATICALLY OBTAINING VIDEO DATA
20200216026 · 2020-07-09 ·

A server device obtains, from a primary device associated with a first vehicle, event data concerning an event, video data concerning the event, and/or location data concerning a location of the first vehicle. The server device processes the event data to determine a type of the event, and determines, based on the type of the event and the location data, a proximity zone around the location of the first vehicle. The server device determines additional devices within the proximity zone, where each additional device is associated with a different vehicle. The server device sends, to the additional devices, a message requesting additional video data concerning the event, and obtains the additional video data from at least one additional device. The server device performs, based on relevant event information based on the event data, the video data, and the additional video data, an action concerning the event.

METHOD, APPARATUS, SYSTEM AND STORAGE MEDIUM FOR AUTHORIZING AUTONOMOUS DRIVING FUNCTION
20200192358 · 2020-06-18 ·

A method, an apparatus, a system and a storage medium for authorizing an autonomous driving function are proposed. The method comprises: sending, by a control system in an autonomous vehicle, an authorization request to a cloud server, when the autonomous driving function needs to be activated; and activating, by the control system, the autonomous driving function, in response to receiving authorization approval instruction information returned by the cloud server after the cloud server verifies authorization for the autonomous vehicle and approves authorization. The technical solution may improve safety of the vehicle and the user.

USER ACTIVATED/DEACTIVATED KEY FOB

A system and method of operating a vehicle using a key fob, including the steps of: establishing an association between the key fob and the vehicle; receiving an activation request at the vehicle, the activation request indicating to the vehicle to activate the key fob for use with the vehicle; in response to the activation request, activating the key fob for use with the vehicle; receiving a radio frequency (RF) signal from the key fob at a passive entry passive start (PEPS) module installed in the vehicle; after receiving the RF signal, sending information included in or derived from the RF signal to a vehicle system module (VSM) of the vehicle; determining that the key fob is authorized based at least in part on the information at the VSM; and carrying out a vehicle access function in response to the determination that the key fob is authorized.

VEHICLE NETWORK INTRUSION DETECTION SYSTEM (IDS) USING VEHICLE STATE PREDICTIONS
20190308589 · 2019-10-10 ·

In one embodiment, a processor of a vehicle predicts a state of the vehicle using a behavioral model. The model is configured to predict the state based in part on one or more state variables that are available from one or more sub-systems of the vehicle and indicative of one or more physical characteristics of the vehicle. The processor computes a representation of a difference between the predicted state of the vehicle and a measured state of the vehicle indicated by one or more state variables available from the one or more sub-systems of the vehicle. The processor detects a malicious intrusion of the vehicle based on the computed representation of the difference between the predicted and measured states of the vehicle exceeding a defined threshold. The processor initiates performance of a mitigation action for the detected intrusion, in response to detecting the malicious intrusion of the vehicle.

System and method to securely activate a vehicle

One general aspect includes a method of activating vehicle operations, the method including: (a) receiving, via a controller, a sequence of input signals from a plurality of device interfaces to define an activation attempt, where each device interface is configured to control operation of a corresponding vehicle aspect; (b) determining, via the controller, if the activation attempt matches an activation sequence key; and (c) activating vehicle operations, via the controller, when it is determined the activation attempt matches the activation sequence key.

REMOTE VEHICLE SYSTEM CONFIGURATION, CONTROL, AND TELEMATICS
20190279499 · 2019-09-12 · ·

A vehicle control system (VCS) includes external communication interfaces, such as a Bluetooth interface, for communicating with a user communication and control device, such as a smart phone or a tablet. The user is enabled to operate certain features of the vehicle, such as the remote start, power locks/trunk, climate control, and security features, through the smart phone. The VCS may also communicate with a remote server via the user's smartphone, for example, providing telematics data and receiving service reminders for display to the user on the smartphone, the VCS, or a display built into the vehicle. The VCS may be custom installed in the vehicle using the user's or the installer's smartphone, without a physical connection from the VCS to the smartphone.

Smart key for vehicle and system

A smart key configured to control a plurality of vehicles includes: a first communication unit configured to exchange information with the plurality of vehicles; an information acquisition device configured to acquire user information associated with a user of the smart key; at least one processor; and a computer-readable medium coupled to the at least one processor having stored thereon instructions which, when executed by the at least one processor, causes the at least one processor to perform operations including: based on the user information, selecting, as a vehicle to enter, at least one vehicle among the plurality of vehicles based on the user information and based on information associated with the plurality of vehicles; and exchanging, through the first communication unit, a signal with the selected at least one vehicle.