SOFTWARE UPDATE FOR A VEHICLE VIA AN ELECTRICAL CHARGING STATION

    公开(公告)号:US20240289120A1

    公开(公告)日:2024-08-29

    申请号:US18657994

    申请日:2024-05-08

    申请人: Red Bend Ltd.

    发明人: Oded Mann Yohan Albo

    IPC分类号: G06F8/65 B60L53/66

    CPC分类号: G06F8/65 B60L53/66

    摘要: A vehicle charging station, comprising: a charging processor configured for, when a vehicle is connected to the charging station: sending to the vehicle a request for at least one power level value; and in response to receiving the at least one power level value from the vehicle: computing an expected amount of time for charging at least one battery of the vehicle; computing an expected amount of time for executing an update of digital data of the vehicle, where the expected amount of time includes an amount of time for reverting the update; and subject to identifying that the update time is less than the charging time according to a time comparison test, sending the vehicle an instruction to execute the update while charging the at least one battery.

    DETECTING AND MITIGATING BLUETOOTH BASED ATTACKS

    公开(公告)号:US20240250983A1

    公开(公告)日:2024-07-25

    申请号:US18560668

    申请日:2022-05-04

    申请人: Red Bend Ltd.

    IPC分类号: H04L9/40

    摘要: Disclosed herein are methods and devices for mitigating Bluetooth (BT) based attacks, using a BT proxy device comprising a first and a second BT interfaces. The BT proxy device is configured to identify a first BT device and a second BT device connected to each other via a BT link, transmit a BT link disconnect to the first and second BT devices while using the device name of the second and first BT devices respectively, use the device name of the second BT device to connect to the first BT device via the first BT interface, use the device name of the first BT device to connect to the second BT device via the second BT interface, intercept BT packets exchanged between the first and the second BT devices, and detect one or more potential attack vectors based on analysis of one or more of the intercepted BT packets.

    DETECTING VEHICLE MALFUNCTIONS AND CYBER ATTACKS USING MACHINE LEARNING

    公开(公告)号:US20230054575A1

    公开(公告)日:2023-02-23

    申请号:US17404759

    申请日:2021-08-17

    申请人: Red Bend Ltd.

    IPC分类号: G06F21/56 G07C5/08

    摘要: Techniques for detecting anomalies or cyber attacks on a vehicle. A computer-implemented method for anomaly or attack detection includes determining, using a first model, a first predicted value of a first variable message associated with a vehicle, determining, using a second model, a second predicted value of the first variable message associated with the vehicle, determining, based on a difference between an actual value of the first variable message and the first predicted value of the first variable message and on a difference between the actual value of the first variable message and the second predicted value of the first variable message, a vector, and determining, using a third model, an output value based on the vector, the output value corresponding to at least one of a likelihood that an anomaly or an attack is occurring or a type of the anomaly or the attack.

    SYSTEMS AND METHODS FOR DISABLING A MALICIOUS ECU IN A CONTROLLER AREA NETWORK (CAN) BUS

    公开(公告)号:US20210279331A1

    公开(公告)日:2021-09-09

    申请号:US17329618

    申请日:2021-05-25

    申请人: Red Bend Ltd.

    IPC分类号: G06F21/55 G06F21/56

    摘要: There is provided a computer implemented method of disabling a malicious electronic control unit (ECU) of a plurality of ECUs in communication with a controller area network (CAN) bus network, the method executed by a computing device in communication with the plurality of ECUs and the CAN bus network, the method comprising: detecting a malicious message transmitted by the malicious ECU over the CAN bus network, and injecting a plurality of bits over the CAN bus network to trigger a predefined plurality of errors for disabling the malicious ECU before the malicious ECU makes an additional attempt to retransmit an additional instance of the malicious message.

    HYBRID LEARNING OF EXPERT HEURISTICS, MACHINE AND DEEP LEARNING FOR RANKING AUTOMOTIVE-GRADE APPLICATIONS

    公开(公告)号:US20240289255A1

    公开(公告)日:2024-08-29

    申请号:US18573901

    申请日:2021-06-25

    申请人: Red Bend Ltd.

    IPC分类号: G06F11/36 G06N3/08

    CPC分类号: G06F11/3636 G06N3/08

    摘要: Disclosed herein are methods and systems for training and using a neural network to evaluate vulnerability of software packages, comprising using a plurality of training samples each associating one of a plurality of software packages with one of a plurality of vulnerabilities identified by one of a plurality of validators to training the neural network to compute a probability of presence of one or more of the plurality of vulnerabilities in each of the plurality of software packages and outputting the trained neural network. The validators may include expert knowledge, heuristics, rule-based models as well as machine learning and deep learning models. The trained neural network may be then applied to compute a probability of presence of one or more of the vulnerabilities in one or more previously unseen software packages based on a feed of vulnerabilities identified in the previously unseen software package(s) by the plurality of validators.

    In-place map database update
    10.
    发明授权

    公开(公告)号:US11960474B2

    公开(公告)日:2024-04-16

    申请号:US17437002

    申请日:2019-03-07

    申请人: Red Bend Ltd.

    发明人: Nir Shats

    摘要: A method of generating a delta instructions record for updating a source database in-place, comprising obtaining a plurality of source data items contained in a plurality of cells of a plurality of tables organized in tuples and columns, creating a column oriented source stream serializing the source data items by concatenating a source data item of each cell of each column to a preceding source data item of a cell preceding the respective cell in the respective column, obtaining a plurality of target data items contained tables of a target database comprising data item(s) changed compared to the source database, creating a column oriented target stream serializing the plurality of target data items, delta instructions for applying changes detected between the source database and the target database by comparing between the source stream and the target stream, and outputting the delta instructions record to device(s) for updating their source database.