Abstract:
The present application relates to a method and apparatus for intelligent wireless protocol optimization including storing, in a memory, a first customer key and a second customer key, receiving, by a processor, a secret key, decrypting, by the processor, the secret key using a first customer key to extract a master key, provisioning, by the processor, an electronic control unit in response to the master key, and deleting, by the processor, the second customer key in response to the provisioning of electronic control unit in response to the master key.
Abstract:
A method and apparatus that authenticate an application are provided. The method includes connecting an authentication application on the first device to a second application of a second device on a second address and port in response to receiving a first request on a first address and port from the second application, receiving a second request including a signed certificate of the second device, determining whether the signed certificate is valid, in response to determining the signed certificate is valid, displaying a screen to accept request if the signed certificate is unapproved, and performing a function if the request is accepted.
Abstract:
A method of transmitting data within a vehicle includes: storing two copies of a data message; constructing at an electronic control unit (ECU) a serial bus message that includes one copy of the data message and a message authentication code (MAC) created using a secret key stored at the ECU, a MAC algorithm, and a different copy of the data message; transmitting the serial bus message to a receiving ECU over a vehicle bus; authenticating the serial bus message at the receiving ECU using a copy of the key stored at the receiving ECU by creating a copy of the MAC from the data message included in the serial bus message and the copy of the key; comparing the MAC from the serial bus message with the copy of the MAC created at the receiving ECU; and rejecting or accepting the data message based on the comparison.
Abstract:
Embodiments include methods, systems and computer readable storage medium for privacy-enhanced biometric access enrollment. The method includes receiving, by a processor, a biometric signing request (BSR) associated with a request for access rights from a user, wherein the BSR comprises hashed biometric data. The method further includes generating, by the processor, a first biometric signature using at least a portion of the BSR. The method further includes generating, by the processor, a second biometric signature based on at least a portion of the BSR. The method further includes generating, by the processor, an authorization token based on at least the first biometric signature and the second biometric signature. The method further includes sending, by the processor, the authorization token to one or more access control entities or a user computing device for conveyance to the one or more access control entities for authentication.
Abstract:
A relay attack deterrence system includes a mobile platform including a plurality of mobile platform transmitter components and a mobile platform receiver component provided therein. The system further includes a fob device having a fob receiver component, a fob transmitter component, and a motion sensor component configured to produce motion information. The fob device is configured to receive, at the fob receiver component, one or more first signals from at least one of the plurality of mobile platform transmitter components and to selectably transmit, to the mobile platform receiver component, a second signal based on the motion information and position information derived from the one or more first signals.
Abstract:
A system and method of regulating data communications between a vehicle electronics system and a computing device includes: communicatively linking a first data port of an isolation device with the vehicle electronics system; communicatively linking a second data port of the isolation device with the computing device; receiving data at the isolation device sent between the computing device and the vehicle electronics system; and permitting the data to pass through the isolation device based on the identity of the computing device, the rate at which the data passes through the isolation device, or the content of the data.
Abstract:
A method of transmitting data within a vehicle includes: storing two copies of a data message; constructing at an electronic control unit (ECU) a serial bus message that includes one copy of the data message and a message authentication code (MAC) created using a secret key stored at the ECU, a MAC algorithm, and a different copy of the data message; transmitting the serial bus message to a receiving ECU over a vehicle bus; authenticating the serial bus message at the receiving ECU using a copy of the key stored at the receiving ECU by creating a copy of the MAC from the data message included in the serial bus message and the copy of the key; comparing the MAC from the serial bus message with the copy of the MAC created at the receiving ECU; and rejecting or accepting the data message based on the comparison.
Abstract:
A system for processing an SMS message transmitted between a vehicle telematics unit and a call center and a method of processing an SMS message using the system. The method includes the steps of: receiving an SMS message having security data, wherein both a header and a payload of the SMS message carry the security data; attempting to authenticate the security data; accepting the SMS message if the security data is authenticated, and ignoring the contents of the SMS message if the security data is not authenticated.