Patent classifications
B60R2325/106
Method for detecting, blocking and reporting cyber-attacks against automotive electronic control units
The disclosed apparatus, systems and methods relate to protecting automotive electronic control units from cyber-attacks.
Authorized Operation of Vehicles
A system enabling a candidate driver to start and operate a vehicle has computerized circuitry coupled to ignition circuitry and to a data repository, the computerized circuitry is adapted to sense whether an ignition switch of the vehicle is open or closed and is adapted to enable or disable ignition voltage. The computerized circuitry communicates wirelessly with a portable communication device, like a smartphone, that stores a list of identities of drivers authorized to operate the vehicle. If a candidate driver is on the list the candidate may start and operate the vehicle, if not, not.
Systems and methods for identifying unauthorized vehicle use
Various arrangements for monitoring the unauthorized use of a vehicle are presented. An in-space parking sensor may be used to detect whether a vehicle is present. Data may be obtained indicating that a particular vehicle parking in the parking space that has the in-space parking sensor. A vehicle departure from the parking space may be detected. A determination may be made that departure of the particular vehicle has occurred during the time period. A notification may be output based on determining that the vehicle departure has occurred.
Authenticating Privilege Elevation On A Transportation Service
The present disclosure is directed to an automotive computer in communication with a mobile device using an authentication manager to increase and/or reduce user privileges that determine a level of vehicle control or feature access that is granted to the user. The authentication manager may increase or decrease the user privilege to standard rider status until the authentication manager has confirmed elevated status for that user via a cloud security challenge question or via a local identification method such as using the mobile device authentication features. This process may be additionally triggered based on environmental or context-based use cases, such as a high traffic condition, local cyber-attack, or transportation of sensitive goods. The system may utilize the authentication to perform out of band pairing of the mobile device and the vehicle, which may add additional security.
Authorized operation of vehicles
A system for starting a vehicle has a first apparatus having a microprocessor, a first data repository, a normally open electrical imposed between positive vehicle battery voltage and a keyed ignition switch, and a second electronic apparatus comprising a second microprocessor executing second coded instructions from a non-transitory medium, the second microprocessor coupled with the first microprocessor, a second data repository coupled to the second microprocessor and storing a list of identities of drivers authorized to operate the vehicle, and an input mechanism enabling a candidate driver to identify to the second microprocessor. The candidate driver identifies to the second microprocessor by the input mechanism, the second microprocessor, executing the second coded instructions, determines if the driver identity matches an identity on the list drivers authorized to operate the vehicle, and if so, causes the first microprocessor to close the normally open contact.
SYSTEM AND METHOD FOR ANTI-TAMPERING MECHANISM
The present teaching relates to method, system, medium, and implementations for detecting sensor tampering. Information is received from an inertial measurement unit (IMU) attached to a structure hosting at least one sensor. The information includes one or more measurements associated with the IMU. The at least one sensor is deployed on a vehicle for sensing surrounding information to facilitate autonomous driving. The one or more measurements are analyzed with respect to pre-determined criteria to detect tampering of the at least one sensor. When the tampering is detected, a response is generated to the event.
ETHERNET-BASED VEHICLE CONTROL SYSTEM AND METHOD
Disclosed is an Ethernet-based vehicle control system and method. The Ethernet-based vehicle control system (method) according to the present invention comprises: a router for connecting a vehicle internal network and a vehicle external network; a vehicle electronic element connected to and communicating with the router; and a third-party module newly mounted on a vehicle to control the vehicle electronic element, wherein the vehicle electronic element includes a Remote Keyless Entry (RKE) module, and the third-party module may piggyback on a signal input into the RKE module by a remote controller through the vehicle external network. According to the present invention, since a third-party module can be freely installed and replaced based on Ethernet, various services related to a vehicle may be realized through a vehicle external network.
System and method for anti-tampering mechanism
The present teaching relates to method, system, medium, and implementations for detecting sensor tampering. Information is received from an inertial measurement unit (IMU) attached to a structure hosting at least one sensor. The information includes one or more measurements associated with the IMU. The at least one sensor is deployed on a vehicle for sensing surrounding information to facilitate autonomous driving. The one or more measurements are analyzed with respect to pre-determined criteria to detect tampering of the at least one sensor. When the tampering is detected, a response is generated to the event.
Authorized Operation of Vehicles
A system for starting a vehicle has a first apparatus having a microprocessor, a first data repository, a normally open electrical imposed between positive vehicle battery voltage and a keyed ignition switch, and a second electronic apparatus comprising a second microprocessor executing second coded instructions from a non-transitory medium, the second microprocessor coupled with the first microprocessor, a second data repository coupled to the second microprocessor and storing a list of identities of drivers authorized to operate the vehicle, and an input mechanism enabling a candidate driver to identify to the second microprocessor. The candidate driver identifies to the second microprocessor by the input mechanism, the second microprocessor, executing the second coded instructions, determines if the driver identity matches an identity on the list drivers authorized to operate the vehicle, and if so, causes the first microprocessor to close the normally open contact.
Authorized Operation of Vehicles
A system for starting a vehicle has a first apparatus having a microprocessor, a first data repository, a normally open electrical imposed between positive vehicle battery voltage and a keyed ignition switch, and a second electronic apparatus comprising a second microprocessor executing second coded instructions from a non-transitory medium, the second microprocessor coupled with the first microprocessor, a second data repository coupled to the second microprocessor and storing a list of identities of drivers authorized to operate the vehicle, and an input mechanism enabling a candidate driver to identify to the second microprocessor. The candidate driver identifies to the second microprocessor by the input mechanism, the second microprocessor, executing the second coded instructions, determines if the driver identity matches an identity on the list drivers authorized to operate the vehicle, and if so, causes the first microprocessor to close the normally open contact.