H04L12/40104

ANOMALY DETERMINATION METHOD, ANOMALY DETERMINATION DEVICE, AND RECORDING MEDIUM
20230048058 · 2023-02-16 ·

In an anomaly determination method for determining an anomaly in a received message, a plurality of messages which include messages that are periodic and each of which includes a first field having a fixed value and a second field having a variable value are each received as the received message, and one of a plurality of combinations to be used for determination each of which includes at least one of a plurality of anomaly determinations including an anomaly determination utilizing a reception timing based on the periodicity or the number of received messages, an anomaly determination utilizing the first field, and an anomaly determination utilizing the second field, is selected according to one or more criteria among available execution time of the anomaly determination method, a load amount, a data amount, and the number of messages.

Secure and adaptive orthogonal division waveforms multiplexing system using channel-based transformation
11558225 · 2023-01-17 ·

Disclosed is a secure and adaptive waveforms multiplexing system in advanced-level wireless communication systems (such as 5G and beyond systems).

TRANSPORT COMPONENT AUTHENTICATION

An example operation includes one or more of sending data from a component on a transport to at least one other component on the transport in at least one location on a bus, comparing the data at the at least one other component to a threshold, and sending a notification, by the at least one other component, to a processor when the data is outside the threshold.

Anomaly determination method, anomaly determination device, and recording medium

In an anomaly determination method for determining an anomaly in a received message, a plurality of messages which include messages that are periodic and each of which includes a first field having a fixed value and a second field having a variable value are each received as the received message, and one of a plurality of combinations to be used for determination each of which includes at least one of a plurality of anomaly determinations including an anomaly determination utilizing a reception timing based on the periodicity or the number of received messages, an anomaly determination utilizing the first field, and an anomaly determination utilizing the second field, is selected according to one or more criteria among available execution time of the anomaly determination method, a load amount, a data amount, and the number of messages.

Systems and methods for data message decoding and asset type fingerprinting

A method for an asset tracking system is provided. An example method includes receiving data messages from an asset coupled to the asset tracking system and attempting to obtain asset information from data messages with reference to a local set of signal definitions indicating how data messages received from the asset are to be decoded into asset information. Upon failing to obtain the asset information the asset tracking system requests from an asset data analysis system the generation of a generated signal definition indicating how the data message of the outstanding type is to be obtained from the asset. The asset tracking system provides access to at least one undecoded data message of the outstanding data type to the asset data analysis system, receives the generated signal definition from the asset data analysis system, and adds the generated signal definition to the local set of signal definitions.

Smart alarm module for automobile security system
11498519 · 2022-11-15 ·

A smart alarm module includes a connector terminal adapted to provide not more than five conductive paths from a fused box and an audio device of the vehicle to the smart alarm module, a CAN bus interface adapted to make connection to the CAN bus of the vehicle to detect communication protocol, a microcontroller adapted to arm the smart alarm module in response to the information received from the remote controller to provide the smart alarm module judgment operation based on the received information, a sensor adapted to quantized shock waves applied to the vehicle and to feed a first activating signal to the microprocessor when the quantized values exceeds a predetermined value, a power supply regulator providing power to the CAN bus interface, microprocessor, and sensor of the smart alarm module, and an output interface adapted to sound the audio device in response to output signal from the microprocessor.

Data transmission system

A marine-type communication device that reads data from a data bus, dynamically creates new data channels for a plurality of operational systems and performs a volatility assessment to determine when to save the data for transmission to a cloud network and when to transmit the data to the cloud network.

E2E SYNCHRONIZATION
20230073618 · 2023-03-09 ·

The present disclosure is directed to systems and methods directed to improving the functions of a vehicle. Systems and methods are provided that provide a custom tool that autogenerates a set of software agents that allows a system to separate processing, transmission and receiving of messages to achieve better synchronization. The disclosure herein also provides a simplified method of key provisioning by designating one client as a server and assigning a symmetric key to every other client permanently provisioned between that client and the server. Systems and method are further provided that predict faults in a vehicle. Systems and methods are also provided that preserve data in the event of a system crash. Systems and methods are also provided in which an operating system of a vehicle detects the presence of a new peripheral and pulls the related interface file for that new peripheral. Further, a data synchronization solution is provided herein which provides optimized levels of synchronization.

METHODS AND SYSTEM FOR VEHICLE FUNCTION LIMITING

Systems and methods for limiting functionality of a vehicle are described. In one example, vehicle feature modules may specify vehicle behaviors and vehicle operation is limited according to the specified behaviors. Vehicle actuators may be adjusted to limit vehicle operation according to the specified vehicle behaviors. The vehicle behaviors may apply to powertrain systems, navigation systems, climate control systems, lighting systems and other vehicle systems.

Reducing runtime load for vehicle system data encryption using crypto engine with direct memory access (DMA)
11474961 · 2022-10-18 · ·

Systems and methods are presented for secured communications in a controller area network for a vehicle system. A first electronic processor is communicatively coupled to a memory and configured to operate one or more vehicle systems. A second electronic processor is configured to generate message authentication codes to verify data communications between the first electronic processor and at least one other vehicle system controller in the controller area network. The direct memory access (DMA) module is configured to facilitate direct communications between the second electronic processor and the memory so that the first electronic processor can continue to execute other instructions while message authentication codes are generated by the second electronic processor for incoming and outgoing message data.