-
公开(公告)号:US20210136572A1
公开(公告)日:2021-05-06
申请号:US16635783
申请日:2018-07-30
Inventor: Jonathan P. Ingraham , Rudra Chakravorty , Tate J. Keegan
Abstract: A system and method for gathering and communicating at least one related data that is cryptographically verifiable and authenticated to use in at least one reconstruction is described. One example includes V2X device encryption provisioning; operating vehicle V2X communications; and storing all V2X data in memory. If at least one occurs: send a final request for data logs from any other V2X in the vicinity. Ensure logs are sent using signed & encrypted protocol. Record black box data; combine stored V2X data with black box data & storing to a file. Apply cryptographic protections to the file; up/down load the file from each vehicle. Recreate the at least one in 3D w/simulation software. In embodiments, reconstruction comprises fault determination.
-
公开(公告)号:US20200169422A1
公开(公告)日:2020-05-28
申请号:US16618544
申请日:2018-06-01
Inventor: Jonathan P. Ingraham , Rudra Chakravorty , Tate J. Keegan
Abstract: A system for securely customizing a computing environment based on cryptographic protections includes providing a key device; bringing the key device proximate to a computing environment (510); beginning an authentication protocol when the user approaches the environment with the device; validating user to the key device (520); comparing certificates (525); unlocking/regenerating a device split key (530); if authentication of certificates is not valid, log & return (540); if it is valid, a full key is generated on the computing environment in volatile memory, and the full key unlocks personal settings on the computing environment (545). Using the computing environment with the personal settings (550); disconnecting (555); and logging activity (560). The device can be a smart phone. Bringing the key proximate to a computing environment (510) can initiate Bluetooth or other near field communications. Initial steps can include enrolling the key (505). The environment can be a vehicle.
-
公开(公告)号:US11288403B2
公开(公告)日:2022-03-29
申请号:US16609973
申请日:2018-05-08
Inventor: Jonathan P. Ingraham , Rudra Chakravorty , Tate J. Keegan
Abstract: A system and method for cryptographic verification of entity/vehicle authenticity, comprising generating a Vehicle Identification Number (VIN)—Key for an individual platform/vehicle; applying the VIN—Key to components of the platform/vehicle; receiving input for the platform/vehicle; validating the authenticity of the input and/or the platform/vehicle; performing the operation of the input if it was validated; terminating the operation if it was not validated; logging the operation; and decommissioning the platform/vehicle at the end of life.
-
公开(公告)号:US11251978B2
公开(公告)日:2022-02-15
申请号:US16618544
申请日:2018-06-01
Inventor: Jonathan P. Ingraham , Rudra Chakravorty , Tate J. Keegan
Abstract: A system for securely customizing a computing environment based on cryptographic protections includes providing a key device; bringing the key device proximate to a computing environment (510); beginning an authentication protocol when the user approaches the environment with the device; validating user to the key device (520); comparing certificates (525); unlocking/regenerating a device split key (530); if authentication of certificates is not valid, log & return (540); if it is valid, a full key is generated on the computing environment in volatile memory, and the full key unlocks personal settings on the computing environment (545). Using the computing environment with the personal settings (550); disconnecting (555); and logging activity (560). The device can be a smart phone. Bringing the key proximate to a computing environment (510) can initiate Bluetooth or other near field communications. Initial steps can include enrolling the key (505). The environment can be a vehicle.
-
公开(公告)号:US20200057872A1
公开(公告)日:2020-02-20
申请号:US16609973
申请日:2018-05-08
Inventor: Jonathan P. Ingraham , Rudra Chakravorty , Tate J. Keegan
Abstract: A system and method for cryptographic verification of entity/vehicle authenticity, comprising generating a Vehicle Identification Number (VIN)—Key for an individual platform/vehicle; applying the VIN—Key to components of the platform/vehicle; receiving input for the platform/vehicle; validating the authenticity of the input and/or the platform/vehicle; performing the operation of the input if it was validated; terminating the operation if it was not validated; logging the operation; and decommissioning the platform/vehicle at the end of life.
-
-
-
-