-
公开(公告)号:US20190068715A1
公开(公告)日:2019-02-28
申请号:US16170451
申请日:2018-10-25
Inventor: Takeshi KISHIKAWA , Hideki MATSUSHIMA , Tomoyuki HAGA , Manabu MAEDA , Yuji UNAGAMI , Yoshihiro UJIIE
IPC: H04L29/08 , B60R16/023 , H04L9/32 , H04L29/06
CPC classification number: H04L67/12 , B60R16/023 , H04L9/3242 , H04L9/3297 , H04L63/08 , H04L63/10 , H04L63/12 , H04L63/20 , H04L2209/84
Abstract: A fraud detection method for use in an in-vehicle network system including a plurality of electronic control units that communicate with one another via an in-vehicle network is provided. The method includes receiving at least one data frame sent to the in-vehicle network, verifying a specific identifier in the received data frame only when the received data frame is event-driven data and a state of a vehicle having the in-vehicle network system mounted therein is a predetermined state, detecting the received data frame as an authenticated data frame when the verifying is successful, and detecting the received data frame as a fraudulent data frame when the verifying fails. The predetermined state of the vehicle is the vehicle traveling.
-
公开(公告)号:US20170361808A1
公开(公告)日:2017-12-21
申请号:US15636007
申请日:2017-06-28
Inventor: Tomoyuki HAGA , Hideki MATSUSHIMA , Manabu MAEDA , Yuji UNAGAMI , Yoshihiro UJIIE , Takeshi KISHIKAWA
CPC classification number: B60R25/307 , B60R2325/108 , H04L9/0891 , H04L9/3242 , H04L67/12 , H04L2209/84
Abstract: An anti-fraud method for use in an in-vehicle network system including a plurality of electronic control units that exchange data frames, each having added thereto a message authentication code (MAC), via a bus includes receiving a data frame transmitted on the bus, and generating a first MAC by using a MAC key and a value of a counter that counts a number of times a data frame having added thereto a MAC is transmitted. The method also includes performing verification that the data frame received has added thereto the generated first MAC and incrementing a number of error occurrences when the verification has failed for the data frame, the data frame including a predetermined message ID. When the number of error occurrences exceeds a predetermined threshold, a process associated in advance with the predetermined message ID is executed.
-
公开(公告)号:US20240406259A1
公开(公告)日:2024-12-05
申请号:US18802033
申请日:2024-08-13
Inventor: Yuji UNAGAMI , Hideki MATSUSHIMA , Tomoyuki HAGA , Manabu MAEDA
IPC: H04L67/1087 , H04L9/00 , H04L9/40
Abstract: In a data distribution method according to the disclosure, first authentication servers and a first data server belong to a first group, and second authentication servers and a second data server belong to a second group different from the first group. A first authentication server obtains first transaction data that includes a data obtaining request indicating a request for obtaining or referring to data pertaining to an apparatus, and records a block including the first transaction data into its distributed ledger belonging to the first group. A second authentication server obtains the first transaction data, and records the block including the first transaction data into a distributed ledger belonging to the second group. The first authentication server causes the first data server to transfer the data pertaining to the apparatus held therein to the second data server or to make such data available for reference by the second data server.
-
公开(公告)号:US20240126877A1
公开(公告)日:2024-04-18
申请号:US18394174
申请日:2023-12-22
Inventor: Ryo KATO , Manabu MAEDA , Tomoyuki HAGA , Naohisa NISHIDA
CPC classification number: G06F21/56 , G06F11/3062
Abstract: A malware detection method for a home network system including one or more home appliances that are connected to a home network includes: obtaining a plurality of setting values including at least information indicating a device type and an operating state of a target device subject to malware detection; selecting one detection model out of a plurality of detection models according to the plurality of setting values obtained; obtaining power consumption or current consumption of the target device; and detecting whether the target device is infected with malware, using the one detection model selected in the selecting and based on the power consumption or the current consumption obtained.
-
公开(公告)号:US20240031385A1
公开(公告)日:2024-01-25
申请号:US18376591
申请日:2023-10-04
Inventor: Manabu MAEDA , Hideki MATSUSHIMA , Tomoyuki HAGA , Yuji UNAGAMI , Yoshihiro UJIIE , Takeshi KISHIKAWA
IPC: H04L9/40 , H04L12/28 , B60R16/023
CPC classification number: H04L63/1416 , H04L12/28 , B60R16/0231 , H04L63/1425 , H04L2012/40215
Abstract: A fraud detecting method for use in an in-vehicle network system including a plurality of electronic control units that communicate with each other via a network includes detecting whether a state of a vehicle satisfies a first condition or a second condition, and switching, upon detecting that the state of the vehicle satisfies the first condition or the second condition, an operation mode of a second electronic control unit connected to the network. A first mode in which a first type of detecting process for detecting a fraudulent message in the network is performed is switched to a second mode in which the first type of detecting process is not performed upon detecting that the state of the vehicle satisfies the first condition. Moreover, the second mode is switched to the first mode upon detecting that the state of the vehicle satisfies the second condition.
-
56.
公开(公告)号:US20230351825A1
公开(公告)日:2023-11-02
申请号:US18218807
申请日:2023-07-06
Inventor: Masashi HISAI , Manabu MAEDA , Ryo KATO , Naohisa NISHIDA , Kenji HARADA , Tomoyuki HAGA , Yuji UNAGAMI
CPC classification number: G07C9/00309 , G07C9/00571 , G07C9/00563 , G07C9/253 , G07C9/27 , G07C2209/63
Abstract: An electric lock control method includes: performing a first determination of whether a person is present in a predetermined region surrounding an electric lock, based on first information generated by an electronic device; when it is determined that a first person is present in the predetermined region in the performing of the first determination, performing a second determination of whether the first person is a person who is permitted to unlock the electric lock, based on second information related to movement of the first person; and controlling a state of the electric lock based on a result of the second determination, the state being a locked state or an unlocked state.
-
公开(公告)号:US20230214483A1
公开(公告)日:2023-07-06
申请号:US18120749
申请日:2023-03-13
Inventor: Yoshihiro UJIIE , Hideki MATSUSHIMA , Tomoyuki HAGA , Yuji UNAGAMI , Takeshi KISHIKAWA
CPC classification number: B60R25/307 , G06F21/552 , H04L12/40 , H04L63/0263 , H04L2012/40215
Abstract: A method used in an on-board network system, having electronic controllers that exchange messages and a fraud-detecting electronic controller. The method includes receiving an inquiry for a vehicle status indicating whether a vehicle in which the fraud-detecting electronic controller is installed is running from an external device, transmitting the vehicle status to the external device, and determining whether a message transmitted conforms to fraud detection rules. The method also includes receiving from the external device the delivery data, including updated fraud detection rules and network type information indicating a network type that the updated fraud detection rules are to be applied The method further includes determining whether the vehicle is running, and whether the network type information indicates a drive network that is connected to an electronic controller related to travel of the vehicle. When the network type information does not indicate the drive network, updating the fraud detection rules.
-
公开(公告)号:US20230084009A1
公开(公告)日:2023-03-16
申请号:US17990224
申请日:2022-11-18
Inventor: Yuji UNAGAMI , Tomoyuki HAGA , Kakuya YAMAMOTO , Ayaka MITANI
Abstract: This control method, etc., are a control method for an anomalous data sensing system including at least a plurality of authentication servers and include: sensing whether data obtained from a device is not anomalous; obtaining first transaction data including information indicating the data; verifying, by a first authentication server included in the plurality of authentication servers, the first transaction data obtained, when the data is sensed as not being anomalous; and recording a block including the first transaction data into a distributed ledger when an agreement about validity of the first transaction data is reached using a consensus algorithm.
-
公开(公告)号:US20230016161A1
公开(公告)日:2023-01-19
申请号:US17945752
申请日:2022-09-15
Inventor: Manabu MAEDA , Hideki MATSUSHIMA , Tomoyuki HAGA , Yuji UNAGAMI , Yoshihiro UJIIE , Takeshi KISHIKAWA
IPC: H04L9/40 , H04L12/28 , B60R16/023
Abstract: A fraud detecting method for use in an in-vehicle network system including a plurality of electronic control units that communicate with each other via a network includes detecting whether a state of a vehicle satisfies a first condition or a second condition, and switching, upon detecting that the state of the vehicle satisfies the first condition or the second condition, an operation mode of a fraud-sensing electronic control unit connected to the network between a first mode in which a first type of detecting process for detecting a fraudulent message in the network is performed and a second mode in which the first type of detecting process is not performed. Moreover, in the second mode, a second type of detecting process having a different degree to which a fraudulent message is detectible than the first type of detecting process is performed.
-
60.
公开(公告)号:US20220279005A1
公开(公告)日:2022-09-01
申请号:US17744862
申请日:2022-05-16
Inventor: Yuishi TORISAKI , Tomoyuki HAGA , Takamitsu SASAKI , Takeshi KISHIKAWA , Hideki MATSUSHIMA
Abstract: A vehicle anomaly detection server includes: a communicator that communicates with a vehicle to receive a log of an in-vehicle network in the vehicle; a processor; and a memory including at least one set of instructions that, when executed by the processor causes the processor to perform operations including: selecting, when information indicating that an anomaly is occurring to a first vehicle among vehicles is obtained by the processor, an anomaly-related vehicle from among the vehicles based on the anomaly, the first vehicle being the vehicle that communicates with the communicator; transmitting, to the anomaly-related vehicle via the communicator, a first request to transmit a log of an in-vehicle network in the anomaly-related vehicle; and determining whether an anomaly is occurring to the anomaly-related vehicle, based on information indicated by the log transmitted from the anomaly-related vehicle and received by the communicator.
-
-
-
-
-
-
-
-
-