B60R2325/108

Delivery assistance device, delivery assistance method, and recording medium

A delivery assistance device assists in an operation of a delivery service in which a vehicle cabin including a trunk of a vehicle used by a requester is able to be designated as a luggage delivery destination. The delivery assistance device includes a key information distribution unit configured to distribute key information that a deliverer of a company that provides the delivery service is to use to unlock a door for access to the vehicle cabin of the vehicle, to the company, and an entry authority information distribution unit configured to distribute entry authority information regarding an authority for the deliverer to enter a predetermined area in which the vehicle is present, to the company when the key information is distributed to the company by the key information distribution unit.

SYSTEMS AND METHODS FOR UTILIZING ENCRYPTION IN MICROCONTROLLERS FOR FOTA

A firmware update system includes a microcontroller which includes an encryption module configured to perform an encryption function. An update module is configured to communicate with the microcontroller to provide a firmware update. The update module includes a decryption module configured to convert the firmware update from plaintext into decryption ciphertext using a decryption function. The encryption module is configured to convert the decryption ciphertext into plaintext such that the microcontroller can execute the plaintext to implement the firmware update.

VEHICLE PASSIVE ENTRY PROTOCOL WITH ULTRA WIDE BAND RANGING
20200198580 · 2020-06-25 ·

A passive entry system for a vehicle includes a portable fob and a communication and control unit disposed on the vehicle, the communication and control unit configured to control a function of the vehicle. The portable fob and the communication and control unit are configured to communicate ultra-wideband (UWB) signals therebetween. When the function of the vehicle is triggered, the communication and control unit initiates a double-sided UWB ranging session with the portable fob where (i) the portable fob determines a first distance between the portable fob and the communication and control unit, and (ii) the communication and control unit determines a second distance between the portable fob and the communication and control unit. The communication and control unit is configured to prevent control of the function of the vehicle if a final distance, determined from the first and second distances, is greater than the predetermined distance.

ACCESS KEY TRANSMISSION OVER PERSONAL AREA NETWORKS IN VEHICLES
20200186333 · 2020-06-11 ·

A vehicle includes a controller. The controller is configured to send a nonce encrypted according to a symmetric encryption key. The nonce is sent responsive to receiving a pair request over a personal area network from a nomadic device outside the vehicle. The controller is further configured to initialize a secure connection using a random key and permit vehicle access according to data received via the secure connection. The initialization is responsive to receiving a concatenation of the random key and an incrementation of the nonce encrypted with the symmetric encryption key.

Car sharing system

A car sharing system includes a car share device installed in a vehicle. The car share device includes a key function unit configured to verify an electronic key ID used by an electronic key system of the vehicle. The car sharing system further includes a key function invalidating unit that invalidates the key function unit when a condition is satisfied for switching the key function unit from a valid state to an invalid state.

ID-based control unit-key fob pairing

A method for pairing a key fob with a control unit is provided. The key fob executes an ID authenticated key agreement protocol with a pairing device based on a key fob identification to authenticate one another and to generate a first encryption key. The pairing device encrypts a control unit identification using the first encryption key. The key fob receives the encrypted control unit identification transmitted from the pairing device. The key fob then executes an ID authenticated key agreement protocol with the control unit based on the control unit identification to authenticate one another and to generate a second encryption key. The key fob then receives an operational key transmitted from the control unit that is encrypted with the second encryption key.

Systems and Methods for Tamper Evident Electronic Detection

Systems and methods are directed to detecting tampering with a secured area of an autonomous vehicle. In one example, a computing system performs operations including generating a first key pair comprising a first private key and a first public key as part of a vehicle registration process; providing the first public key to one or more remote computing systems; determining whether a reset event occurred at a vehicle; in response to determining that the reset event occurred, discarding the first key pair and generating a second key pair comprising a second private key and a second public key; receiving a status query from one of the one or more remote computing systems; generating a response to the status query, the response being signed using either the first private key or the second private key; and providing the response to the one of the one or more remote computing systems.

Motorcycle with system of authorization control
10640086 · 2020-05-05 · ·

A motorcycle (1) including: an electronic system of authorization control (100,200); wherein: a first electronic control unit (200) is adapted and configured to determine whether the motorcycle (1) is in an authorized or non-authorized usage state and is adapted to interrogate a portable transponder, which can have a master identification electronic code or a slave identification electronic code, in order to acquire said electronic code and to verify if said electronic code is correct; and wherein: if the first control unit (200) acquires the master identification electronic code, starting the traction engine is allowed independently from the second electronic control unit; if the first control unit (200) acquires the slave identification electronic code, it is determined that the motorcycle (1) is in the authorized usage state and starting the traction engine is allowed if it receives consent information from the second electronic control unit (100).

METHOD FOR A TWO-STAGE AUTHORIZATION OF A CHARGING PROCESS ON A CHARGING POST
20200130643 · 2020-04-30 ·

The method for a two-stage authorization of a charging operation includes a first stage and a second stage. In the first stage, a control device allocated to the charging station receives a terminal-side proof of authorization transmitted from a mobile terminal device. The first personal authorization of the charging station user is verified on the basis of the terminal-side proof of authorization, without any action of the charging station user being required. With the given first authorization, the charging cable is released. In the second stage, the vehicle-side proof of authorization is received and verified after the vehicle has been connected to the charging cable, whereupon in response to verification of the vehicle-side proof of authorization, a second authorization is carried out, due to which the charging operation is approved.

Vehicle system and control method thereof

A vehicle system is provided that performs authentication with a plurality of terminals. The system includes a server that generates a first token and transmits the first token to a first terminal. The first terminal stores the first token and a vehicle verifies the first token using a first encryption key and a first authentication key stored in advance for the first token. A second terminal receives the first token and a second token from the first terminal to be delegated with an authority. The second terminal stores the first token and the second token, and the vehicle verifies the first token stored in the second terminal using the first encryption key and the first authentication key, and verifies the second token stored in the second terminal using a second encryption key and a second authentication key stored in advance for the second token.