METHOD FOR DIGITAL KEY MISBEHAVIOR AND SYBIL ATTACK DETECTION THROUGH USER PROFILING

    公开(公告)号:US20210104107A1

    公开(公告)日:2021-04-08

    申请号:US16592145

    申请日:2019-10-03

    Abstract: A digital key sharing system includes an electronic circuit and a first server computer. The electronic circuit is configured to store a plurality of digital keys, receive a plurality of key sharing requests, and generate a plurality of features in response to the plurality of key sharing requests. The first server computer is in wireless communication with the electronic circuit and is configured to generate an alert signal in response to finding one or more anomalies in the plurality of features to initiate a notification to a primary user device associated with the electronic circuit, and send a suspend notification signal to the electronic circuit in response to the finding of the one or more anomalies in the plurality of features. The electronic circuit is further configured to suspend use of the plurality of digital keys in response to reception of the suspend notification signal.

    ETHERNET NETWORK-PROFILING INTRUSION DETECTION CONTROL LOGIC AND ARCHITECTURES FOR IN-VEHICLE CONTROLLERS

    公开(公告)号:US20210075800A1

    公开(公告)日:2021-03-11

    申请号:US16642262

    申请日:2017-12-15

    Abstract: Presented herein are intrusion detection systems and algorithms for networked vehicle controllers and devices, methods for making/using such systems and algorithms, and motor vehicles with a network of ECUs and network-profiling intrusion detection capabilities. A method for detecting intrusions into an onboard network of vehicle controllers includes determining the current state of operation of a vehicle, and identifying a network traffic pattern table corresponding to the vehicle's current state of operation. Network traffic flow for one of the in-vehicle controllers is monitored when exchanging data over the Ethernet communication interface while the motor vehicle is operating in the current state of operation. The method then determines if a traffic characteristic of the monitored network traffic flow is outside a calibrated boundary that is determined from the network traffic pattern table. Responsive to the monitored network traffic flow characteristic being outside the calibrated boundary, the method executes a remedial action response.

    Method for digital key misbehavior and sybil attack detection through user profiling

    公开(公告)号:US10977885B1

    公开(公告)日:2021-04-13

    申请号:US16592145

    申请日:2019-10-03

    Abstract: A digital key sharing system includes an electronic circuit and a first server computer. The electronic circuit is configured to store a plurality of digital keys, receive a plurality of key sharing requests, and generate a plurality of features in response to the plurality of key sharing requests. The first server computer is in wireless communication with the electronic circuit and is configured to generate an alert signal in response to finding one or more anomalies in the plurality of features to initiate a notification to a primary user device associated with the electronic circuit, and send a suspend notification signal to the electronic circuit in response to the finding of the one or more anomalies in the plurality of features. The electronic circuit is further configured to suspend use of the plurality of digital keys in response to reception of the suspend notification signal.

    REMOTE VEHICLE SPATIAL AWARENESS NOTIFICATION SYSTEM

    公开(公告)号:US20190337451A1

    公开(公告)日:2019-11-07

    申请号:US15969292

    申请日:2018-05-02

    Abstract: Technical solutions are described herein for providing driver notification in a vehicle. An example system includes one or more sensors that measure one or more attributes of a remote object in a predetermined vicinity of the vehicle. The system further includes an output device that provides a notification to a driver. The system further includes a remote object monitoring system that generates a driver notification to be provided via the output device based on the attributes of the remote object. Generating the driver notification includes determining a recklessness score for the remote object based on the attributes of the remote object. Generating the driver notification further includes, in response to the recklessness score exceeding a predetermined threshold, generating the driver notification that comprises a directional information that provides a spatial awareness of a location of the remote object in relation to the vehicle.

    PRIVACY-ENHANCED BIOMETRIC AUTHENTICATED ACCESS REQUEST

    公开(公告)号:US20180351946A1

    公开(公告)日:2018-12-06

    申请号:US15608166

    申请日:2017-05-30

    Abstract: Embodiments include methods, systems and computer readable storage medium for privacy-enhanced biometric access enrollment. The method includes receiving, by a processor, a biometric signing request (BSR) associated with a request for access rights from a user, wherein the BSR comprises hashed biometric data. The method further includes generating, by the processor, a first biometric signature using at least a portion of the BSR. The method further includes generating, by the processor, a second biometric signature based on at least a portion of the BSR. The method further includes generating, by the processor, an authorization token based on at least the first biometric signature and the second biometric signature. The method further includes sending, by the processor, the authorization token to one or more access control entities or a user computing device for conveyance to the one or more access control entities for authentication.

Patent Agency Ranking