Abstract:
The present application relates to a method and apparatus for providing fault tolerant provisioning verification for cryptographic keys including receiving, via an interface, a first security key, a second security key, and a first verification data generated in response to the first security key and the second security key, coupling, by a processor, the first security key and the second security key to an electronic controller, receiving, by the processor, a second verification data generated by the electronic controller in response to the first security key and the second security key, and marking, by the processor, the controller as provisioned in response to the first verification data matching the second verification data.
Abstract:
The present application relates to a method and apparatus for providing fault tolerant provisioning verification for cryptographic keys including receiving, via an interface, a first security key, a second security key, and a first verification data generated in response to the first security key and the second security key, coupling, by a processor, the first security key and the second security key to an electronic controller, receiving, by the processor, a second verification data generated by the electronic controller in response to the first security key and the second security key, and marking, by the processor, the controller as provisioned in response to the first verification data matching the second verification data.
Abstract:
Authentication methods, systems and computer readable storage medium are provided. In an embodiment, an authentication method includes obtaining from an authentication template a first template portion, including an encoding of features, and a second template portion, including an identification of a location in the first template portion that is not usable. The method further includes revising the first template portion by setting a value at the location to a selected value to form a revised first template portion. Also, the method includes creating an authentication codeword from the revised first template portion and from public recovery data. The method further includes performing an error correction process to generate a corrected authentication codeword from the authentication codeword and from the second template portion and decoding the corrected authentication codeword.
Abstract:
A system and a method are disclosed providing user information in a vehicle. The method includes the steps of: providing over a vehicle network a cryptographic key in response to receiving a wireless signal from a wireless transmitter at a first electronic control unit (ECU); receiving at a second ECU the cryptographic key; authenticating the cryptographic key at the second ECU; and providing user information via the second ECU based on the authentication.
Abstract:
A dual output headlight system includes a projection system having a laser light source to emit incoherent light. The projection system also has a partitioned display surface including a headlight display section and a selectively active augmented display section. The partitioned display surface is positioned in a first path of the incoherent light from the laser light source and to generate a display output. The dual output headlight system also includes an optical splitter positioned in a second path of the display output to split the display output into a headlight illumination output and a graphical output.
Abstract:
A system and method for employing a mechanism for unlocking a vehicle ECU. The ECU stores a unique ECU identification value that identifies the particular ECU and a secure server stores the ECU identification value and a unique ECU security key value, where the identification value identifies the security key value in the server, and where the secure server stores the unique ECU identification value and the unique security key value for many ECUs. A service tool that wants to gain access to the ECU for software reprogramming or service requests the ECU identification value and a challenge from the ECU and sends them to the secure server, which then identifies the security key value associated with that ECU identification value and the response for the challenge. The secure server then sends the response to the service tool, which provides it to the ECU to unlock it for programming.
Abstract:
Systems and methods for theft deterrence of a vehicle are provided. Each of two or more immobilization point devices generate a random number and broadcasts it to all of the other immobilization points devices. Each of the immobilization point devices retains a local copy of its own random number and concatenates the local copy of its own random number with the random numbers of the other of the two or more immobilization point devices from the bus. From the random numbers broadcast on the bus, all of the random numbers are concatenated in a predetermined sequence to form a single challenge, which is transmitted to a remote transponder. Each of the immobilization point devices then compares a single response from the transponder to their local concatenation. When a specific portion of the response from the transponder matches a local concatenation, then enabling the function of the immobilization point device.
Abstract:
A message authentication system for a network includes a private communication system including one or more private nodes in electronic communication with one another, a public communication system including one or more public nodes in electronic communication with one another, and a security proxy device that electronically connects the private communication system to the public communication system. The security proxy device includes a processing unit, a security module, and a lightweight security module that is electronic communication with the one or more private nodes of the private communication system. The lightweight security module generates message authentication codes for messages transmitted by the private communication system that are sent to the public communication system.
Abstract:
A message authentication system for a network includes a private communication system including one or more private nodes in electronic communication with one another, a public communication system including one or more public nodes in electronic communication with one another, and a security proxy device that electronically connects the private communication system to the public communication system. The security proxy device includes a processing unit in electronic communication with a network device. The network device includes a security module integrated into the security proxy device, a private domain including one or more unique ports and storing one or more transmit keys for authenticating messages generated by one of the private nodes of the private communication system, and a public domain including one or more public ports.
Abstract:
A machine learning/artificial intelligence (ML/AI) system includes one or more controllers storing one or more neural networks in memory. The one or more neural networks include a plurality of layers including an input layer, one or more hidden layers, and an output layer, and one or more nodes provided for each of the plurality of layers of the one or more neural networks. Each of the plurality of layers are connected to a subsequent layer of the one or more neural networks by a connection. The connection connects a first node of an earlier layer with a second node of a later layer. The one or more neural networks also include plurality of weights, where each weight is associated with a connection and only a portion of the plurality of weights of the one or more neural networks are encrypted or protected.