-
公开(公告)号:US09660968B2
公开(公告)日:2017-05-23
申请号:US14865147
申请日:2015-09-25
Applicant: Intel Corporation
Inventor: Christopher N. Gutierrez , Jianqing Zhang , Manoj R. Sastry , Anand S. Konanur
CPC classification number: H04L63/061 , H04B13/005 , H04W4/80 , H04W12/04
Abstract: In a method for enabling devices to communicate securely, a first device dynamically generates a human body nonce (HBN) and then sends that HBN to a second device via a human body communication conduit (HBCC). After sending the HBN from the first device to the second device, the first device uses the HBN to establish security for an over-the-air (OTA) communication session between the first device and the second device. For instance, the first device may derive a key, based at least in part on the HBN, and the first device may use the key to encrypt communications to be sent OTA between the first device and the second device. Other embodiments are described and claimed.
-
公开(公告)号:US20170093822A1
公开(公告)日:2017-03-30
申请号:US14865147
申请日:2015-09-25
Applicant: Intel Corporation
Inventor: Christopher N. Gutierrez , Jianqing Zhang , Manoj R. Sastry , Anand S. Konanur
CPC classification number: H04L63/061 , H04B13/005 , H04W4/80 , H04W12/04
Abstract: In a method for enabling devices to communicate securely, a first device dynamically generates a human body nonce (HBN) and then sends that HBN to a second device via a human body communication conduit (HBCC). After sending the HBN from the first device to the second device, the first device uses the HBN to establish security for an over-the-air (OTA) communication session between the first device and the second device. For instance, the first device may derive a key, based at least in part on the HBN, and the first device may use the key to encrypt communications to be sent OTA between the first device and the second device. Other embodiments are described and claimed.
-
3.
公开(公告)号:US11665178B2
公开(公告)日:2023-05-30
申请号:US16727638
申请日:2019-12-26
Applicant: Intel Corporation
Inventor: Christopher N. Gutierrez , Shabbir Ahmed , Marcio Juliato , Manoj Sastry , Liuyang L. Yang , Xiruo Liu
CPC classification number: H04L63/1408 , G06N20/20 , H04L12/40032 , H04L63/0227 , H04L63/1425 , H04L63/1441 , H04L2012/40273
Abstract: Logic may reduce the latency and increase the confidence in message time series (MTS) intrusion detection systems (IDSs). Logic may capture traffic on an in-vehicle network bus during a first traffic window. Logic may filter the traffic within the first traffic window to determine more than one observation window, wherein the more than observation window comprises at least a first observation window and a second observation window. Logic may evaluate the more than one observation window to determine a first output based on a first observation window and a second output based on a second observation window, the first and second outputs to indicate if an intrusion is detected. Logic may determine, based on a combination of the outputs, that the traffic during the first traffic window comprises an intrusion. Logic may output an indication of the intrusion.
-
4.
公开(公告)号:US20190039612A1
公开(公告)日:2019-02-07
申请号:US16145285
申请日:2018-09-28
Applicant: Intel Corporation
Inventor: Liuyang Lily Yang , Manoj R. Sastry , Xiruo Liu , Moreno Ambrosin , Shabbir Ahmed , Marcio Juliato , Christopher N. Gutierrez
IPC: B60W30/095 , B60W40/02 , G01S5/00
Abstract: In an automated method for providing driving assistance, an electronic control unit (ECU) of a first driving assistance system of a first vehicle receives local object information from at least one sensing component of the first driving assistance system. The first driving assistance system automatically detects external objects outside of the first vehicle, based on the local object information received from the at least one sensing component. The first driving assistance system also receives a reported object list (ROL) from a second vehicle, wherein the ROL describes objects detected by a second driving assistance system in the second vehicle. The first driving assistance system also affects operation of the first vehicle, based on (a) the external objects detected by the first vehicle and (b) the ROL from the second vehicle. Other embodiments are described and claimed.
-
5.
公开(公告)号:US20220350888A1
公开(公告)日:2022-11-03
申请号:US17867780
申请日:2022-07-19
Applicant: INTEL CORPORATION
Inventor: Christopher N. Gutierrez , Marcio Juliato , Shabbir Ahmed , Qian Wang , Manoj Sastry , Liuyang L. Yang , Xiruo Liu
IPC: G06F21/56
Abstract: Logic may implement observation layer intrusion detection systems (IDSs) to combine observations by intrusion detectors and/or other intrusion detection systems. Logic may monitor one or more control units at one or more observation layers of an in-vehicle network, each of the one or more control units to perform a vehicle function. Logic may combine observations of the one or more control units at the one or more observation layers. Logic may determine, based on a combination of the observations, that one or more of the observations represent an intrusion. Logic may determine, based at least on the observations, characteristics of an attack, and to pass the characteristics of the attack information to a forensic logging system to log the attack or pass the characteristics of the attack to a recovery system for informed selection of recovery procedures. Logic may dynamically adjust a threshold for detection of suspicious activity.
-
公开(公告)号:US20210014806A1
公开(公告)日:2021-01-14
申请号:US17032921
申请日:2020-09-25
Applicant: Intel Corporation
Inventor: Javier Perez-Ramirez , Mikhail Galeev , Susruth Sudhakaran , Dave Cavalcanti , Manoj R. Sastry , Christopher N. Gutierrez
Abstract: Systems and methods in which devices synchronize their clocks for purposes of data transmission are described. Particularly, the disclosed systems and methods provide detection and mitigation of interference by malicious (or non-malicious) wireless devices with communication of time synchronized data over wireless networks. Systems and methods are provided where times statistics related to multiple instances of wireless time synchronization are collected and collated. Devices in the system can discipline their internal clocks based on the collated time statistics.
-
7.
公开(公告)号:US12045348B2
公开(公告)日:2024-07-23
申请号:US17867780
申请日:2022-07-19
Applicant: INTEL CORPORATION
Inventor: Christopher N. Gutierrez , Marcio Juliato , Shabbir Ahmed , Qian Wang , Manoj Sastry , Liuyang L Yang , Xiruo Liu
IPC: G06F21/56
CPC classification number: G06F21/566 , G06F2221/034
Abstract: Logic may implement observation layer intrusion detection systems (IDSs) to combine observations by intrusion detectors and/or other intrusion detection systems. Logic may monitor one or more control units at one or more observation layers of an in-vehicle network, each of the one or more control units to perform a vehicle function. Logic may combine observations of the one or more control units at the one or more observation layers. Logic may determine, based on a combination of the observations, that one or more of the observations represent an intrusion. Logic may determine, based at least on the observations, characteristics of an attack, and to pass the characteristics of the attack information to a forensic logging system to log the attack or pass the characteristics of the attack to a recovery system for informed selection of recovery procedures. Logic may dynamically adjust a threshold for detection of suspicious activity.
-
8.
公开(公告)号:US11423145B2
公开(公告)日:2022-08-23
申请号:US16727565
申请日:2019-12-26
Applicant: Intel Corporation
Inventor: Christopher N. Gutierrez , Marcio Juliato , Shabbir Ahmed , Qian Wang , Manoj Sastry , Liuyang L. Yang , Xiruo Liu
IPC: G06F21/56
Abstract: Logic may implement observation layer intrusion detection systems (IDSs) to combine observations by intrusion detectors and/or other intrusion detection systems. Logic may monitor one or more control units at one or more observation layers of an in-vehicle network, each of the one or more control units to perform a vehicle function. Logic may combine observations of the one or more control units at the one or more observation layers. Logic may determine, based on a combination of the observations, that one or more of the observations represent an intrusion. Logic may determine, based at least on the observations, characteristics of an attack, and to pass the characteristics of the attack information to a forensic logging system to log the attack or pass the characteristics of the attack to a recovery system for informed selection of recovery procedures. Logic may dynamically adjust a threshold for detection of suspicious activity.
-
-
-
-
-
-
-