-
公开(公告)号:US12200323B2
公开(公告)日:2025-01-14
申请号:US18045976
申请日:2022-10-12
Applicant: HUAWEI TECHNOLOGIES CO., LTD.
Inventor: Steven Yin Zhong , Yanjiang Yang , Zhuo Wei
Abstract: A camera authentication method and a control apparatus are provided, and are applicable to an identity authentication of an on-board camera in the autonomous driving field. The method includes: obtaining one or more frames of a first image shot by a to-be-authenticated camera; determining one or more light intensity offset values of N photosensitive units based on the one or more frames of the first image; determining a matching degree between the light intensity offset values of the N photosensitive units and a preset N-dimensional vector; and if the matching degree meets a preset condition, determining that authentication of the to-be-authenticated camera succeeds, where the N photosensitive units are in a photosensitive layer of the to-be-authenticated camera, and the photosensitive layer includes M photosensitive units, where N≤M. This technical solution is used to improve camera security.
-
公开(公告)号:US20220417425A1
公开(公告)日:2022-12-29
申请号:US17896719
申请日:2022-08-26
Applicant: Huawei Technologies Co., Ltd.
Inventor: Mark Ryan , Flavio Garcia , Steven Yin Zhong , Zhuo Wei
Abstract: A camera identification method comprises identifying a to-be-identified camera using a light sensitivity deviation of each pixel in the to-be-identified camera; generating corresponding identification data; identifying a target camera using a light sensitivity deviation of each pixel in the target camera; and identifying the target camera by comparing a similarity between data that identifies the target camera and identification data of a known camera.
-
公开(公告)号:US20230199500A1
公开(公告)日:2023-06-22
申请号:US18167627
申请日:2023-02-10
Applicant: Huawei Technologies Co., Ltd.
Inventor: Feng Geng , Qingdi Sha , Steven Yin Zhong
IPC: H04W12/122 , H04L9/32
CPC classification number: H04W12/122 , H04L9/32 , H04W56/002
Abstract: A secure onboard network communication method includes obtaining an initial value of a first freshness value (FV), obtaining a second value based on the initial value, and refreshing the initial value to the second value; sending a first message, where the first message includes the second value of the first FV; obtaining an initial value of a second FV, and when a first condition is met, refreshing the second FV to the second value, where the first condition includes a condition that the second value of the first FV is greater than or equal to a sum of the initial value of the second FV and a predetermined value.
-
公开(公告)号:US20230067338A1
公开(公告)日:2023-03-02
申请号:US17973767
申请日:2022-10-26
Applicant: Huawei Technologies Co., Ltd.
Inventor: Steven Yin Zhong , Xinxing Yin , Mingming Zhang
Abstract: A data transmission method includes: a first electronic control unit (ECU) that obtains to-be-sent data. The first ECU determines a protection policy corresponding to the to-be-sent data from a plurality of protection policies, where the protection policies include a plurality of different encapsulation formats for the to-be-sent data and at least two protection policies with different calculation amounts for processing the to-be-sent data. The first ECU encapsulates the to-be-sent data according to the protection policy corresponding to the to-be-sent data to obtain an encapsulated packet. The first ECU sends the encapsulated packet to a second ECU, where the first ECU and the second ECU are any two ECUs in a vehicle.
-
公开(公告)号:US20220365195A1
公开(公告)日:2022-11-17
申请号:US17872066
申请日:2022-07-25
Applicant: Huawei Technologies Co., Ltd.
Inventor: Mark Ryan , Flavio Garcia , Steven Yin Zhong , Zhuo Wei
Abstract: A radar authentication method includes after obtaining output data of a to-be-authenticated radar, a computer device that first invokes a prediction model to obtain predicted data of the to-be-authenticated radar based on the output data of the to-be-authenticated radar, where the prediction model is obtained through training based on output data of a target radar. Then the computer device verifies, based on the predicted data of the to-be-authenticated radar and the output data of the to-be-authenticated radar, whether the to-be-authenticated radar and the target radar are the same radar.
-
-
-
-