摘要:
A method to perform secure boot procedure using a multi-stage security verification is provided. The procedure includes, within a microcontroller, referring to a table to identify a first defined memory region including code useful to start-up application programming of the microcontroller, wherein the application programming is operable to provide a function of the microcontroller to the vehicle, and a second defined memory region, including programming and data useful to operation of the application programming of the microcontroller. The procedure further includes, within a first stage, verifying authenticity of contents of the first region and starting-up the application programming of the microcontroller based upon verifying the authenticity of the contents of the first region. The procedure further includes, within a second stage, verifying authenticity of contents of the second region and operating the application programming to provide the function based upon verifying the authenticity of the contents of the second region.
摘要:
A system and method for personalization of security features of a vehicle. The system includes a memory having computer readable instructions and one or more processors for executing the computer readable instructions, the computer readable instructions controlling the one or more processors to perform operations. The operations include detecting a person in a cabin of a vehicle. At least one adjustable vehicle setting is detected in relation to the person in the cabin of the vehicle. The adjustable vehicle setting is compared to a stored adjustable vehicle setting in a first user profile. Operation of the vehicle by the person in the cabin of the vehicle is enabled based on the comparison and a permitted level of access from the first user profile.
摘要:
An impairment detection system is provided and includes an emitter, first and second beam selectors, a reference reflector, a sensor and a control module. The emitter is configured to emitter a first light signal. The first beam selector is configured to forward the first light signal to a touch probe. The reference reflector is configured to reflect the first light signal received from the first beam selector to generate a second reflected signal. The second beam selector is configured to receive (i) a first reflected signal from the touch probe based on reflection of the first light signal on an area of a person, and (ii) the second reflected signal. The sensor is configured to receive from the second beam selector the first reflected signal and the second reflected signal. The control module is configured to determine an impairment level of the person based on an output of the sensor.
摘要:
A system for establishing a wireless connection between a mobile device and a vehicle includes a human-machine interface (HMI), a vehicle communication system, where the vehicle communication system includes a wireless connection transceiver, a speaker, a microphone, a controller in electrical communication with the HMI, the vehicle communication system, the speaker, and the microphone. The controller is programmed to activate a wireless connection mode of the controller based at least in part on a signal from the microphone and transmit a vehicle wireless connection identifier using the speaker. The controller is further programmed to confirm a vehicle wireless connection passcode using at least one of the speaker and the microphone and establish a wireless connection between the mobile device and the controller using the wireless connection transceiver in response to confirming the vehicle wireless connection passcode.
摘要:
A system comprises a computer including a processor and a memory. The memory includes instructions such that the processor is programmed to: receive, at a device driver, an Ethernet frame from an Automotive Open System Architecture (AUTOSAR) communication stack, determine, at the device driver, whether the Ethernet frame is a spoofed Ethernet frame, and transmit a cancelation command to at least one layer of the AUTOSAR communication stack when the device driver determines the Ethernet frame is spoofed.
摘要:
The present application relates to a method and apparatus for intelligent wireless protocol optimization including storing, in a memory, a first customer key and a second customer key, receiving, by a processor, a secret key, decrypting, by the processor, the secret key using a first customer key to extract a master key, provisioning, by the processor, an electronic control unit in response to the master key, and deleting, by the processor, the second customer key in response to the provisioning of electronic control unit in response to the master key.
摘要:
A system and method of wireless communication between a location-based wireless communications device and a vehicle, the method including the steps of: detecting when the vehicle is within an operating range of the location-based wireless communications device; establishing a short-range wireless communication (SRWC) connection between the location-based wireless communications device and the vehicle, wherein the SRWC connection is carried out over at least a first frequency band that enables a multi-Gbps data transfer rate; and transferring data between the location-based wireless communications device and the vehicle over the SRWC connection.
摘要:
A system and method of controlling access to electronic control units (ECUs) includes: receiving, at an ECU supplier computer, a supplier encryption key derived from a master encryption key using a supplier identifier that identifies an ECU supplier; issuing an ECU identifier that identifies an ECU and includes the supplier identifier; generating for the ECU an ECU unlock authorization key using the supplier encryption key and the ECU identifier; and storing the ECU unlock authorization key and the ECU identifier in the ECU.
摘要:
A system and a method are disclosed providing user information in a vehicle. The method includes the steps of: providing over a vehicle network a cryptographic key in response to receiving a wireless signal from a wireless transmitter at a first electronic control unit (ECU); receiving at a second ECU the cryptographic key; authenticating the cryptographic key at the second ECU; and providing user information via the second ECU based on the authentication.
摘要:
The present application relates to a method and apparatus for providing fault tolerant provisioning verification for cryptographic keys including receiving, via an interface, a first security key, a second security key, and a first verification data generated in response to the first security key and the second security key, coupling, by a processor, the first security key and the second security key to an electronic controller, receiving, by the processor, a second verification data generated by the electronic controller in response to the first security key and the second security key, and marking, by the processor, the controller as provisioned in response to the first verification data matching the second verification data.