Patent classifications
B60R2325/108
Authentication system and authentication method
An authentication system includes a first controller that performs wireless communication with a mobile terminal and a first authentication unit that executes authentication of the mobile terminal including ID authentication and code authentication through the wireless communication performed between the first controller and the mobile terminal. The first authentication unit executes the code authentication by determining whether a terminal-side calculation result obtained by the mobile terminal matches a controller-side calculation result obtained by the first controller. The authentication system further includes a second controller that communicates with the mobile terminal and a second authentication unit that applies encryption communication using a portion of the terminal-side calculation result and a portion of the controller-side calculation result to communication performed between the second controller and the mobile terminal and authenticates the encryption communication.
Authenticating Privilege Elevation On A Transportation Service
The present disclosure is directed to an automotive computer in communication with a mobile device using an authentication manager to increase and/or reduce user privileges that determine a level of vehicle control or feature access that is granted to the user. The authentication manager may increase or decrease the user privilege to standard rider status until the authentication manager has confirmed elevated status for that user via a cloud security challenge question or via a local identification method such as using the mobile device authentication features. This process may be additionally triggered based on environmental or context-based use cases, such as a high traffic condition, local cyber-attack, or transportation of sensitive goods. The system may utilize the authentication to perform out of band pairing of the mobile device and the vehicle, which may add additional security.
Vehicle control system
The present disclosure provides an apparatus, method and system for use with a vehicle having passive keyless entry and start (PKES) system including a vehicle unit and a key fob storage unit. The vehicle united is to be installed with the vehicle having a first transceiver, a first relay transceiver an authentication unit, a first controller for controlling said first relay transceiver allowing said transmission if said user is authenticated. The key fob storage unit comprises at least one housing for securely holding at least one key fob associated with said PKES systems of said vehicles, a second, said second wireless relay w wherein said first relay transceiver and said second relay transceiver allows said PKES system and said key fob to communicate from a distance larger than a range of said PKES system signals.
KEYED-ALIKE PHONE-BASED KEYS
A keyed-alike digital consumer access key is generated for distribution to a plurality of vehicles of a fleet. The keyed-alike digital consumer access key is deployed to the plurality of vehicles. The keyed-alike digital consumer access key is deployed to a mobile device. A request from a mobile device may be received to gain access to the plurality of vehicles. Responsive to validating the mobile device, the mobile device may be sent the keyed-alike digital consumer access key and a unique identifier corresponding to the mobile device, the keyed-alike digital consumer access key for use by the mobile device in authentication to one or more of the plurality of vehicles, the unique identifier for use by the mobile device in tracking which mobile device is accessing the one or more of the plurality of vehicles.
Loading determination system, loading determination method and authentication information control system
A loading determination system includes: a storage unit configured to store dimension information for each of a plurality of loading regions which is present in a vehicle, the dimension information being relevant to an upper limit of a dimension of a parcel which is able to be loaded in each of the loading regions; and a control unit configured to determine, based on the dimension information, whether a first parcel which is planned to be loaded is able to be loaded in the vehicle and output a determination result of whether the first parcel is able to be loaded, and first information relevant to a first loading region in which the first parcel is planned to be loaded when the first parcel is able to be loaded, the first loading region being included in the plurality of loading regions.
Method for delegating access rights
A method for delegating access rights to a secured object includes generating a first-order data packet in a trusted central management device. The data packet contains a first identifier, a first data set having access rights to a secured device and a first data secret key for encryption and signature. A second-order data packet is signed via the first data secret key and is created in the first mobile communication device and contains a unique identifier, reference data, a second data set having access rights, a second data secret key for encryption and a first data container. The first data container is encrypted via the first data secret key and contains the first identifier and the second data secret key. The signed second-order data packet is transmitted to a second mobile communication device of a second user.
LOADING DETERMINATION SYSTEM, LOADING DETERMINATION METHOD AND AUTHENTICATION INFORMATION CONTROL SYSTEM
A loading determination system includes: a storage unit configured to store dimension information for each of a plurality of loading regions which is present in a vehicle, the dimension information being relevant to an upper limit of a dimension of a parcel which is able to be loaded in each of the loading regions; and a control unit configured to determine, based on the dimension information, whether a first parcel which is planned to be loaded is able to be loaded in the vehicle and output a determination result of whether the first parcel is able to be loaded, and first information relevant to a first loading region in which the first parcel is planned to be loaded when the first parcel is able to be loaded, the first loading region being included in the plurality of loading regions.
Method for activation of at least one security function of a security system of a vehicle
The invention relates to a method (100) for a security system (200) of a vehicle (1), in particular for a keyless activation of at least one security function of the vehicle (1).
SECURITY ARCHITECTURE FOR A REAL-TIME REMOTE VEHICLE MONITORING SYSTEM
Disclosed are devices, systems and methods for securing wireless communications between a remote monitor center and a vehicle by using redundancy measures to increase the robustness of the system. In some embodiments, a system may include redundant communication channels, deploy redundant hardware and software stacks to enable switching to a backup in an emergency situation, and employ hypervisors at both the remote monitor center and the vehicle to monitor hardware and software resources and perform integrity checks. In other embodiments, message digests based on a cryptographic hash function and a plurality of predetermined commands are generated at both the remote monitor center and the vehicle, and compared to ensure the continuing integrity of the wireless communication system.
VEHICLE ACCESS BASED ON RF DIGESTS/BACKGROUNDS
According to certain examples, a circuit-based wireless communications system provides secure access to a vehicle by way of certain circuitry configure to compare a first RF background observed for a vehicle-located RF receiver that is part of a vehicle-located circuit secured to a vehicle, with a second RF background observed for a wireless-communications vehicle-access circuit that includes another RF receiver. In response, a distance metric is generated to indicate a degree of similarity between the first RF background and the second RF background, and based on whether this metric satisfies a threshold, access to the vehicle may be granted via the wireless-communications vehicle-access circuit.