-
公开(公告)号:US20240289120A1
公开(公告)日:2024-08-29
申请号:US18657994
申请日:2024-05-08
申请人: Red Bend Ltd.
发明人: Oded Mann , Yohan Albo
摘要: A vehicle charging station, comprising: a charging processor configured for, when a vehicle is connected to the charging station: sending to the vehicle a request for at least one power level value; and in response to receiving the at least one power level value from the vehicle: computing an expected amount of time for charging at least one battery of the vehicle; computing an expected amount of time for executing an update of digital data of the vehicle, where the expected amount of time includes an amount of time for reverting the update; and subject to identifying that the update time is less than the charging time according to a time comparison test, sending the vehicle an instruction to execute the update while charging the at least one battery.
-
公开(公告)号:US20240250983A1
公开(公告)日:2024-07-25
申请号:US18560668
申请日:2022-05-04
申请人: Red Bend Ltd.
发明人: Jonathan Katz , Shachar Mendelowitz , Ori Goldberg , Yosef Golan
IPC分类号: H04L9/40
CPC分类号: H04L63/1441 , H04L63/1416 , H04L63/1433
摘要: Disclosed herein are methods and devices for mitigating Bluetooth (BT) based attacks, using a BT proxy device comprising a first and a second BT interfaces. The BT proxy device is configured to identify a first BT device and a second BT device connected to each other via a BT link, transmit a BT link disconnect to the first and second BT devices while using the device name of the second and first BT devices respectively, use the device name of the second BT device to connect to the first BT device via the first BT interface, use the device name of the first BT device to connect to the second BT device via the second BT interface, intercept BT packets exchanged between the first and the second BT devices, and detect one or more potential attack vectors based on analysis of one or more of the intercepted BT packets.
-
公开(公告)号:US11959771B2
公开(公告)日:2024-04-16
申请号:US17219810
申请日:2021-03-31
申请人: RED BEND LTD.
发明人: Ohad Akiva , Dan Atsmon
IPC分类号: G01C21/00 , G01C21/12 , G01C21/28 , G01S19/48 , G06T7/62 , G06T7/70 , G06T7/80 , G06V20/56 , G06V20/58 , G06V20/64
CPC分类号: G01C21/3848 , G01C21/005 , G01C21/12 , G01C21/28 , G01C21/3811 , G01C21/3819 , G01S19/485 , G06T7/62 , G06T7/70 , G06T7/80 , G06V20/582 , G06V20/588 , G06V20/64 , G06T2207/10032 , G06T2207/30256
摘要: A method of enhancing positioning of a moving vehicle based on visual identification of visual objects, comprising obtaining from a location sensor a global positioning and a movement vector of a moving vehicle, capturing one or more images using one or more imaging devices mounted on the moving vehicle to depict at least partial view of a surroundings of the moving vehicle, analyzing the image(s) to identify one or more visual objects having a known geographical position obtained according to the global positioning from a visual data record associated with a navigation map, analyzing the image(s) to calculate a relative positioning of the moving vehicle with respect to the identified visual object(s), calculating an enhanced positioning of the moving vehicle based on the relative positioning and applying the enhanced positioning to a navigation system of the moving vehicle.
-
公开(公告)号:US20230054575A1
公开(公告)日:2023-02-23
申请号:US17404759
申请日:2021-08-17
申请人: Red Bend Ltd.
摘要: Techniques for detecting anomalies or cyber attacks on a vehicle. A computer-implemented method for anomaly or attack detection includes determining, using a first model, a first predicted value of a first variable message associated with a vehicle, determining, using a second model, a second predicted value of the first variable message associated with the vehicle, determining, based on a difference between an actual value of the first variable message and the first predicted value of the first variable message and on a difference between the actual value of the first variable message and the second predicted value of the first variable message, a vector, and determining, using a third model, an output value based on the vector, the output value corresponding to at least one of a likelihood that an anomaly or an attack is occurring or a type of the anomaly or the attack.
-
5.
公开(公告)号:US11418519B2
公开(公告)日:2022-08-16
申请号:US16934838
申请日:2020-07-21
申请人: Red Bend LTD.
IPC分类号: H04L9/40 , G06F21/55 , G06F21/64 , H04W12/10 , H04W12/106 , H04W12/128 , B60R25/00 , H04L67/12 , H04W12/00 , H04W4/44 , H04W4/70
摘要: There is provided a method for identifying malicious activity that changes the integrity of data sent out from a vehicle, comprising: intercepting, by an output data monitoring agent that monitors data sent out from the vehicle to an external receiving computing unit using a communication interface in communication with a network; intercepting, by at least one sensor data monitoring agent that monitors sensor data outputted by at least one sensor associated with the vehicle; monitoring the integrity of the data sent out by the vehicle by analyzing the data collected by the output data monitoring agent with the sensor data collected by the at least one sensor data monitoring agent to identify a mismatch; and identifying an indication of malicious activity that changed the data sent out from the vehicle relative to the data sensed by the at least one sensor.
-
公开(公告)号:US20210279331A1
公开(公告)日:2021-09-09
申请号:US17329618
申请日:2021-05-25
申请人: Red Bend Ltd.
发明人: Tomer Gilad , Shachar Rosen
摘要: There is provided a computer implemented method of disabling a malicious electronic control unit (ECU) of a plurality of ECUs in communication with a controller area network (CAN) bus network, the method executed by a computing device in communication with the plurality of ECUs and the CAN bus network, the method comprising: detecting a malicious message transmitted by the malicious ECU over the CAN bus network, and injecting a plurality of bits over the CAN bus network to trigger a predefined plurality of errors for disabling the malicious ECU before the malicious ECU makes an additional attempt to retransmit an additional instance of the malicious message.
-
公开(公告)号:US12081990B2
公开(公告)日:2024-09-03
申请号:US17443944
申请日:2021-07-28
申请人: Red Bend Ltd.
发明人: Shachar Mendelowitz , Ori Goldberg , David Reikher
摘要: Systems and methods for verifying wireless connections are provided. In one example, a method includes, at a computing system, responsive to initiating a wireless connection between a client device and a host device, generating a communication fingerprint of the client device based on at least one response characteristic of the client device, the at least one response characteristic based on a communication between the client device and the host device, the communication passing through each of a software layer of the client device and a hardware element of the client device. In this way, overall system security of a wireless connection between the host device and the client device may be increased.
-
8.
公开(公告)号:US20240289255A1
公开(公告)日:2024-08-29
申请号:US18573901
申请日:2021-06-25
申请人: Red Bend Ltd.
发明人: Shachar MENDELOWITZ , Jonathan KATZ , Ori GOLDBERG , Yosef GOLAN
CPC分类号: G06F11/3636 , G06N3/08
摘要: Disclosed herein are methods and systems for training and using a neural network to evaluate vulnerability of software packages, comprising using a plurality of training samples each associating one of a plurality of software packages with one of a plurality of vulnerabilities identified by one of a plurality of validators to training the neural network to compute a probability of presence of one or more of the plurality of vulnerabilities in each of the plurality of software packages and outputting the trained neural network. The validators may include expert knowledge, heuristics, rule-based models as well as machine learning and deep learning models. The trained neural network may be then applied to compute a probability of presence of one or more of the vulnerabilities in one or more previously unseen software packages based on a feed of vulnerabilities identified in the previously unseen software package(s) by the plurality of validators.
-
公开(公告)号:US12020013B2
公开(公告)日:2024-06-25
申请号:US17432438
申请日:2019-02-19
申请人: RED BEND LTD.
CPC分类号: G06F8/65 , G06F11/0757 , G06F11/1433 , G06F11/3476 , G06F21/57 , H04L67/34 , H04W4/46
摘要: A method of updating Electronic Control Units (ECUs) of vehicles using updates received via Vehicle to Vehicle (V2V) communication channels comprising receiving from nearby vehicle(s) via V2V communication channel(s), one or more of a plurality of update packages distributed for updating a plurality of ECUs deployed in a plurality of vehicles, each of the nearby vehicle(s) is within a reception area of the V2V communication channel(s), analyzing an identifier extracted from each update package to determine whether the update package is directed to ECU(s) of the vehicle, communicating via the V2V communication channel(s), in case of positive determination, with a subset of the vehicles each maintaining a local log associating each update package with a respective verification code to validate the verification code extracted from the update package according to a consensus of the subset and, in case of successful validation, initiating update of the ECU(s) using the update package(s).
-
公开(公告)号:US11960474B2
公开(公告)日:2024-04-16
申请号:US17437002
申请日:2019-03-07
申请人: Red Bend Ltd.
发明人: Nir Shats
IPC分类号: G06F16/00 , G06F16/22 , G06F16/23 , G06F16/2455 , G06F16/29
CPC分类号: G06F16/2379 , G06F16/221 , G06F16/2264 , G06F16/24568 , G06F16/29
摘要: A method of generating a delta instructions record for updating a source database in-place, comprising obtaining a plurality of source data items contained in a plurality of cells of a plurality of tables organized in tuples and columns, creating a column oriented source stream serializing the source data items by concatenating a source data item of each cell of each column to a preceding source data item of a cell preceding the respective cell in the respective column, obtaining a plurality of target data items contained tables of a target database comprising data item(s) changed compared to the source database, creating a column oriented target stream serializing the plurality of target data items, delta instructions for applying changes detected between the source database and the target database by comparing between the source stream and the target stream, and outputting the delta instructions record to device(s) for updating their source database.
-
-
-
-
-
-
-
-
-