CYBERSECURITY VULNERABILITY PRIORITIZATION AND REMEDIATION

    公开(公告)号:US20200034574A1

    公开(公告)日:2020-01-30

    申请号:US15711666

    申请日:2017-09-21

    Abstract: A system and method of evaluating one or more cybersecurity vulnerabilities to establish a priority metric for each of the one or more cybersecurity vulnerabilities, the method including: constructing a cybersecurity attack schema for each of the one or more cybersecurity vulnerabilities; determining, for each of the plurality of malicious actions of each of the one or more cybersecurity vulnerabilities, one or more resource metrics; obtaining, for each of the one or more cybersecurity vulnerabilities, one or more final resource metrics based on evaluating each of the one or more resource metrics; obtaining, for each of the one or more cybersecurity vulnerabilities, an impact metric that is indicative of a degree of damage that can be caused by the cybersecurity vulnerability; and calculating, for each of the one or more cybersecurity vulnerabilities, a cybersecurity priority level based on the impact metric and the one or more final resource metrics.

    Method and system for reflectometry based communication network monitoring, intrusion detection, and message authentication
    4.
    发明授权
    Method and system for reflectometry based communication network monitoring, intrusion detection, and message authentication 有权
    用于基于反射测量的通信网络监控,入侵检测和消息认证的方法和系统

    公开(公告)号:US09578047B2

    公开(公告)日:2017-02-21

    申请号:US14595584

    申请日:2015-01-13

    Abstract: Systems and methods are provided for monitoring and detecting intrusions and authenticating messages on a communication network of a vehicle. A plurality of signals transmitted over communications network between an electronic control module and a remote electronic module are monitored. Reflectometry feature sets are extracted from the plurality of signals and compared to a repository of predetermined communication network feature sets to generate a mismatch value. The mismatch value is compared to a predetermined threshold range and an authenticated event occurs when the mismatch value is within the predetermined threshold range. When the mismatch value is outside the predetermined threshold range, a flagged event occurs and is recorded.

    Abstract translation: 提供了系统和方法,用于在车辆的通信网络上监视和检测入侵和认证消息。 监视通过电子控制模块和远程电子模块之间的通信网络传输的多个信号。 从多个信号中提取反射特征集,并与预定的通信网络特征集的存储库进行比较以产生不匹配值。 将不匹配值与预定阈值范围进行比较,并且当失配值在预定阈值范围内时发生认证事件。 当不匹配值在预定阈值范围之外时,发生标记事件并被记录。

    Security system and method for disabling vehicle functions

    公开(公告)号:US11420656B2

    公开(公告)日:2022-08-23

    申请号:US16927230

    申请日:2020-07-13

    Abstract: A vehicle system comprising a plurality of subsystems, each of the plurality of subsystems configured to perform at least a portion of at least one of a plurality of functions. The plurality of functions are organized in a hierarchy of functions including complex higher order functions and simpler lower order functions. The vehicle system further comprises an advanced computing module configured to control the plurality of subsystems in order to perform a higher order function and a lower order function that supports the higher order function. The advanced computing module comprises software instructions including a first gate point. The first gate point may be activated to prevent the advanced computing module from performing the higher order function.

    Cybersecurity vulnerability prioritization and remediation

    公开(公告)号:US10678954B2

    公开(公告)日:2020-06-09

    申请号:US15711666

    申请日:2017-09-21

    Abstract: A system and method of evaluating one or more cybersecurity vulnerabilities to establish a priority metric for each of the one or more cybersecurity vulnerabilities, the method including: constructing a cybersecurity attack schema for each of the one or more cybersecurity vulnerabilities; determining, for each of the plurality of malicious actions of each of the one or more cybersecurity vulnerabilities, one or more resource metrics; obtaining, for each of the one or more cybersecurity vulnerabilities, one or more final resource metrics based on evaluating each of the one or more resource metrics; obtaining, for each of the one or more cybersecurity vulnerabilities, an impact metric that is indicative of a degree of damage that can be caused by the cybersecurity vulnerability; and calculating, for each of the one or more cybersecurity vulnerabilities, a cybersecurity priority level based on the impact metric and the one or more final resource metrics.

    RESPONDING TO ELECTRONIC IN-VEHICLE INTRUSIONS
    9.
    发明申请
    RESPONDING TO ELECTRONIC IN-VEHICLE INTRUSIONS 有权
    针对电子车辆侵扰

    公开(公告)号:US20160219028A1

    公开(公告)日:2016-07-28

    申请号:US14607910

    申请日:2015-01-28

    Abstract: A system and method of responding to unauthorized electronic access to a vehicle includes: receiving data indicating unauthorized electronic access to electronic hardware in the vehicle; initiating an electronic hardware countermeasure in response to the unauthorized electronic access; generating a command set that instructs at least a portion of the electronic hardware to implement the electronic hardware countermeasure; and communicating the command set to the portion of the electronic hardware.

    Abstract translation: 响应未经授权的电子访问车辆的系统和方法包括:接收指示未经授权的电子访问车辆中的电子硬件的数据; 响应于未授权的电子访问发起电子硬件对策; 生成指示电子硬件的至少一部分来实现电子硬件对策的指令集; 以及将所述命令集传送到所述电子硬件的所述部分。

    Secure software file transfer systems and methods for vehicle control modules
    10.
    发明授权
    Secure software file transfer systems and methods for vehicle control modules 有权
    用于车辆控制模块的安全软件文件传输系统和方法

    公开(公告)号:US08966248B2

    公开(公告)日:2015-02-24

    申请号:US13627055

    申请日:2012-09-26

    Abstract: A server includes an import module that receives a first content file and a first instruction file from a design network. The first instruction file includes a first set of parameters. A job request module, based on the first instruction parameter set, determines a second parameter set and generates a second instruction file comprising the second parameter set. The job request module transmits the first content file and the second parameter set to a signature server. An export module receives a signature file from the signature server. The signature server generates the signature file based on the second instruction file. The export module integrates the signature into the first content file to generate a second content file and downloads the second content file to at least one of a service server, a manufacturing server, and a supplier network.

    Abstract translation: 服务器包括从设计网络接收第一内容文件和第一指令文件的导入模块。 第一指令文件包括第一组参数。 作业请求模块基于第一指令参数集确定第二参数集,并生成包括第二参数集的第二指令文件。 作业请求模块将第一内容文件和第二参数集发送到签名服务器。 导出模块从签名服务器接收签名文件。 签名服务器基于第二指令文件生成签名文件。 导出模块将签名集成到第一内容文件中以生成第二内容文件,并将第二内容文件下载到服务服务器,制造服务器和供应商网络中的至少一个。

Patent Agency Ranking