Abstract:
A method for performance tuning an electronic control unit (ECU). The performance tuning may include determining one or more tunable values stored on a tunable implementation memory of the ECU to specify tunable calibration data for one or more tunable calibration parameters selected for performance tuning and controlling an application software of the ECU to execute according to the tunable calibration data.
Abstract:
A method of providing access to a password-protected electronic control unit (ECU) using encryption includes generating a cryptographic key for the ECU using a master password, a serial number of the ECU, and a password-based key derivation function; converting the generated cryptographic key into an ECU password; and accessing data from the ECU using the ECU password.
Abstract:
A vehicle system comprising a plurality of subsystems, each of the plurality of subsystems configured to perform at least a portion of at least one of a plurality of functions. The plurality of functions are organized in a hierarchy of functions including complex higher order functions and simpler lower order functions. The vehicle system further comprises an advanced computing module configured to control the plurality of subsystems in order to perform a higher order function and a lower order function that supports the higher order function. The advanced computing module comprises software instructions including a first gate point. The first gate point may be activated to prevent the advanced computing module from performing the higher order function.
Abstract:
A vehicle control module is provided and includes a hybrid memory and a processor. The hybrid memory includes: application memory that stores application code; boot memory that stores a first RMTS code, where the first RMTS code includes first risk functions; and ETM that temporarily stores a second RMTS code. The second RMTS code includes second risk functions. The processor: based on an operating mode of the vehicle control module, executes the application, first RMTS and second RMTS codes; erases the ETM prior to installation of the vehicle control module in a vehicle or delivery of the vehicle; and based on the first RMTS code, permits execution of the first RMTS code prior to and subsequent to installation of the vehicle control module in the vehicle and the second RMTS code prior to installation of the vehicle control module in the vehicle or delivery of the vehicle.
Abstract:
A system for providing privileged access to an internal vehicle communication network is provided. The system includes a presentation network bus configured to provide listen-only access to a subset of in-vehicle networks, a security system configured to enable access to the presentation network bus by verifying access credentials, and a diagnostic service system configured to control access to the presentation network bus. The diagnostic service system is configured to receive a diagnostic service request after the access credentials have been verified to enable the presentation network busses for listen-only access to the subset of the in-vehicle networks. The presentation network busses may be enabled for the listen-only access after credential verification by the security system and in response to receipt of a diagnostic service request from the diagnostic service system requesting that the presentation network busses be enabled.
Abstract:
A communication network implements a Universal Measurement and Calibration Protocol (XCP) policy. The communication network includes a plurality of nodes, each of the nodes being operably connected to a bus to send and to receive data communications to and from others of the plurality of nodes. Certain of the data communications include a Universal Measurement and Calibration Protocol (XCP) identifier indicating the presence of XCP protocol within the data frame. At least one of the nodes is configured to mitigate identified XCP protocol in accordance with the policy.
Abstract:
A system and method of responding to unauthorized electronic access to a vehicle includes: receiving data indicating unauthorized electronic access to electronic hardware in the vehicle; initiating an electronic hardware countermeasure in response to the unauthorized electronic access; generating a command set that instructs at least a portion of the electronic hardware to implement the electronic hardware countermeasure; and communicating the command set to the portion of the electronic hardware.
Abstract:
A system and method of responding to unauthorized electronic access to a vehicle includes: receiving data indicating unauthorized electronic access to electronic hardware in the vehicle; initiating an electronic hardware countermeasure in response to the unauthorized electronic access; generating a command set that instructs at least a portion of the electronic hardware to implement the electronic hardware countermeasure; and communicating the command set to the portion of the electronic hardware.
Abstract:
A system and method of securely communicating information between a vehicle and a central facility includes receiving at a vehicle diagnostic tool a challenge query from the vehicle; establishing a wireless connection between the vehicle diagnostic tool and a central facility; transmitting the challenge query from the vehicle diagnostic tool to the central facility via the wireless connection; receiving at the vehicle diagnostic tool a response to the challenge query via the wireless connection; and accessing one or more vehicle modules on the vehicle using the received response to the challenge query.