-
公开(公告)号:US20240396969A1
公开(公告)日:2024-11-28
申请号:US18694525
申请日:2022-09-21
Applicant: Cummins Inc.
Inventor: Dong P. Hoang , Randall L. Wolf , Christopher S. York , Mallika Reddy
IPC: H04L67/12
Abstract: A computer system includes a plurality of communication interfaces. A first interface configured to bidirectionally communicate with a first ECU engineering tool using a first communication protocol. A second interface configured to bidirectionally communicate with a second ECU engineering tool using a second communication protocol differing from the first communication protocol. A third interface is configured to bidirectionally communicate with an electronic control unit (ECU) using a third communication protocol. A connection manager is configured to provide concurrent utilization by the first interface and the second interface of a single communication session with the ECU via the third interface.
-
公开(公告)号:US20240004986A1
公开(公告)日:2024-01-04
申请号:US18340064
申请日:2023-06-23
Applicant: Cummins Inc.
Inventor: Bhalchandra Phad , Ashwani Mattoo , Harshad Chandak , Christopher S. York , Randall L. Wolf
CPC classification number: G06F21/44 , H04L9/3236
Abstract: A process provides certificateless securely authentication of an executable program. The process includes launching an executable program, the executable program including a secure program component, in response to a post-launch authentication trigger, calculating using the secure component a cryptographic hash function (CHF) digest of at least a portion of the executable program, accessing using the secure component a previously-calculated CHF digest of said at least the portion of the executable program contained in a white-box data structure of the executable program, comparing using the secure component the CHF digest and the previously-calculated CHF digest, and in response to the comparing indicating equality of the CHF digest and the previously-calculated CHF digest, authorizing an operation of the executable program.
-
公开(公告)号:US20240259177A1
公开(公告)日:2024-08-01
申请号:US18565340
申请日:2022-05-27
Applicant: Cummins Inc.
Inventor: Christopher S. York , Daniel Thomas Hackett , Gregory Khari Hinkson , Randall L. Wolf , Sharika K. Kumar
IPC: H04L9/00
CPC classification number: H04L9/002 , H04L2209/16
Abstract: Methods and systems for extending white-box cryptography are provided. A computing device can maintain, in a memory, one or more cryptography keys encrypted using a white-box cryptography solution. The one or more cryptography keys encrypt or decrypt data with a cryptography algorithm not supported by the white-box cryptography solution. The computing device can perform one or more anti-tampering verifications to detect tampering events for tampering with the computing device or an application installed on the computing device. The computing device can, upon determining that no tampering event is detected, decrypt the one or more cryptography keys using the white-box cryptography solution, and provide the one or more cryptography keys to encrypt or decrypt the data using the cryptography algorithm not supported by the white-box cryptography solution.
-
公开(公告)号:US20220232022A1
公开(公告)日:2022-07-21
申请号:US17611084
申请日:2020-05-13
Applicant: Cummins Inc.
Inventor: Sharika K. Kumar , Subhojeet Mukherjee , Howard Bishop , Christopher S. York , Andrew T. Hillery
Abstract: Methods and systems of improving security of a computing system having a network of embedded devices are disclosed. The method includes starting a timer of a predetermined length of time, obtaining an expected number of cyclic messages to be received within the predetermined length of time, incrementing a message counter each time a cyclic message is received within the predetermined length of time, incrementing a set counter in response to an actual number of cyclic messages received by the end of the predetermined length of time exceeding the expected number of cyclic messages to be received by a first threshold value, and detecting an intrusion in the system in response to the set counter exceeding a second threshold value by the end of the predetermined length of time.
-
-
-