Vehicle-mounted device upgrade method and related device

    公开(公告)号:US11985238B2

    公开(公告)日:2024-05-14

    申请号:US17085878

    申请日:2020-10-30

    CPC分类号: H04L9/088 G06F8/65

    摘要: Embodiments disclose a vehicle-mounted device upgrade method and a related device. The method may be applied to an intelligent vehicle, the intelligent vehicle includes a vehicle-mounted control device, and the method may include: receiving, by the vehicle-mounted control device, a first partial key sent by the communications device; restoring, by the vehicle-mounted control device, a first key by using the first partial key and a second partial key that is stored on the vehicle-mounted control device; and performing, by the vehicle-mounted control device, secure processing on a first upgrade file by using the first key, to obtain the securely processed first upgrade file, where the secure processing includes generating first message authentication code (MAC), and the securely processed first upgrade file includes the first upgrade file and the first MAC. According to this application, the vehicle-mounted device can be securely and efficiently upgraded.

    Network security management method, and apparatus

    公开(公告)号:US11895157B2

    公开(公告)日:2024-02-06

    申请号:US17939637

    申请日:2022-09-07

    IPC分类号: H04L9/40 H04W76/10

    CPC分类号: H04L63/20 H04L63/08 H04W76/10

    摘要: Embodiments of this application provide a network security management method and an apparatus. The method includes: receiving, by a first network device, a session request sent by a terminal device, where the session request is used to request establishment of a first session with a first data network, the session request includes first authentication information for the first session, and the first authentication information includes identifier information of the first data network; obtaining, by the first network device, second authentication information for a second session of the terminal device, where the second authentication information includes identifier information of a second data network to which the second session is connected; and if the identifier information of the first data network is the same as the identifier information of the second data network, authorizing the terminal device to establish the first session with the first data network.

    SMARTPHONES BASED VEHICLE ACCESS
    6.
    发明申请

    公开(公告)号:US20200099522A1

    公开(公告)日:2020-03-26

    申请号:US16686861

    申请日:2019-11-18

    摘要: This invention relates to a symmetric key-based generation and distribution system and method for a vehicle access authentication framework comprising: a first device operated by a car owner, a second device operated by a delegated user, and a third device residing in a vehicle. The first device is configured to: request for an authentication key from the third device, the request for the authentication key comprising an ID of the first device, idO; receive an authentication key KidO from the third device;; and generate a delegated authentication key KidU based on authentication key KidO and an ID of the second device in response to receiving a request for delegated authentication key from the second device, the request for delegated authentication key comprising the ID of the second device.

    ENCRYPTION KEY MANAGEMENT METHOD AND APPARATUS

    公开(公告)号:US20200084028A1

    公开(公告)日:2020-03-12

    申请号:US16688729

    申请日:2019-11-19

    IPC分类号: H04L9/08 H04L29/06

    摘要: A key management method/apparatus (user equipment) are described. The key management includes encrypting user identity information based on a first public key. The user equipment sends a first user identity message to a first network device. The first user identity message includes the user identity information, an indication identifier that indicates whether the user identity information is encrypted, and a reference identifier for indexing the first public key. The first network device sends, to a second network device, a third user identity message including the user identity information and the reference identifier that indexes the first public key. Thus, when receiving the third user identity message, the second network device can determine the encrypted user identity information, according to a pre-stored mapping table including the first private key.

    Blacklist management method for IBC-based distributed authentication framework

    公开(公告)号:US10581860B2

    公开(公告)日:2020-03-03

    申请号:US16372668

    申请日:2019-04-02

    摘要: A system for managing and distributing a blacklist of User Equipment IDs (UE IDs) in a network. The system comprises a number of groups of networks, each of the groups of networks comprise a blacklist server and a number of authentication servers. The system further comprises a Package Key Generator (PKG). The blacklist server is configured to: store a blacklist containing UE IDs that are not allowed to gain access to the network; transmit the blacklist to the plurality of authentication servers in the same group; receive a message; determine a content in the message is an order to add a new revoked UE ID to the blacklist; update the blacklist to include the new revoked UE ID; and send an update blacklist message to the plurality of authentication servers in the same group.

    Dedicated SSR pipeline stage of router for express traversal (EXTRA) NoC

    公开(公告)号:US10554584B2

    公开(公告)日:2020-02-04

    申请号:US16032804

    申请日:2018-07-11

    发明人: Zhiguo Ge Naxin Zhang

    摘要: This invention is related to an Express Traversal (EXTRA) Network on Chip (NoC) comprising a number of EXTRA routers. The EXTRA NoC comprises a Buffer Write and Route Computation (BW/RC) pipeline, a Switch Allocation-Local (SA-L) pipeline, a Setup Request (SR) pipeline, a Switch Allocation-Global (SA-G) pipeline, and a Switch Traversal and Link Traversal (ST/LT) pipeline. The BW/RC pipeline is configured to write an incoming flit to an input buffer(s) of a start EXTRA router and compute the route for the incoming head flit by selecting an output port to depart from the start EXTRA router. The SA-L pipeline is configured to arbitrate the start EXTRA router to choose an input port and an output port for a winning flit. The SR pipeline is configured to handle the transmission of a number of SR signals from the start EXTRA router to downstream EXTRA routers.