-
公开(公告)号:US11807227B2
公开(公告)日:2023-11-07
申请号:US16399967
申请日:2019-04-30
Applicant: Intel Corporation
Inventor: Sridhar Sharma , Patrick Mead , Ignacio Alvarez , Kathiravetpillai Sivanesan , Justin Gottschlich , Shahab Layeghi , Liuyang Lily Yang
IPC: B60W30/09 , B60W30/095 , B60W50/14 , G06V20/58 , G06V10/764
CPC classification number: B60W30/09 , B60W30/0956 , B60W50/14 , G06V10/764 , G06V20/58 , G06V20/584 , B60W2050/146 , B60W2420/42
Abstract: Methods and apparatus to generate vehicle warnings are disclosed. An example apparatus includes a sensor to detect a vehicle, where the sensor is associated with an observer of the vehicle, an object tracker to determine a motion of the vehicle, an accident estimator to calculate a likelihood of a collision of the vehicle based on the determined motion, and a transceiver to transmit a message to the vehicle upon the likelihood of the collision exceeding a threshold, where the message includes information pertaining to the collision.
-
公开(公告)号:US20230284029A1
公开(公告)日:2023-09-07
申请号:US18088442
申请日:2022-12-23
Applicant: Intel Corporation
Inventor: Liuyang Lily Yang , Manoj R. Sastry , Xiruo Liu , Moreno Ambrosin
CPC classification number: H04W12/122 , G05D1/0088 , G08G1/164 , H04W4/40 , H04W8/005 , H04W48/02 , G05D2201/0213
Abstract: A first roadway system receives a communication from a second roadway system over a wireless channel, where the communication includes a description of a physical object within a driving environment. Characteristics of the physical object are determined based on sensors of the first roadway system. The communication is determined to contain an anomaly based on a comparison of the description of the physical object with the characteristics determined based on the sensors of the first roadway system. Misbehavior data is generated to describe the anomaly. A remedial action is initiated based on the anomaly.
-
3.
公开(公告)号:US20230086899A1
公开(公告)日:2023-03-23
申请号:US17482773
申请日:2021-09-23
Applicant: Intel Corporation
Inventor: Vesh Raj Sharma Banjade , S M Iftekharul Alam , Kuilin Clark Chen , Kshitij Arun Doshi , Francesc Guim Bernat , Christian Maciocco , Ned M. Smith , Liuyang Lily Yang , Satish Chandra Jha
IPC: H04W16/14
Abstract: A computing node includes interface circuitry and processing circuitry. To implement a spectrum harvesting entity in a wireless network configured for crowdsource-based unlicensed spectrum harvesting, the processing circuitry is configured to select a set of crowdsourcing nodes from a plurality of crowdsourcing nodes available in the wireless network. A plurality of spectrum occupancy reports (SORs) is received from the set of crowdsourcing. Each of the plurality of SORs indicates a channel occupancy status of a communication channel in the unlicensed spectrum sensed by a corresponding crowdsourcing node of the set and geolocation associated with the corresponding crowdsourcing node. A spectrum occupancy map of the unlicensed spectrum is generated based on the channel occupancy status and the geolocation provided in the plurality of SORs by each crowdsourcing node of the set of crowdsourcing nodes.
-
公开(公告)号:US11553346B2
公开(公告)日:2023-01-10
申请号:US16729250
申请日:2019-12-27
Applicant: Intel Corporation
Inventor: Liuyang Lily Yang , Manoj R. Sastry , Xiruo Liu , Moreno Ambrosin
Abstract: A first roadway system receives a communication from a second roadway system over a wireless channel, where the communication includes a description of a physical object within a driving environment. Characteristics of the physical object are determined based on sensors of the first roadway system. The communication is determined to contain an anomaly based on a comparison of the description of the physical object with the characteristics determined based on the sensors of the first roadway system. Misbehavior data is generated to describe the anomaly. A remedial action is initiated based on the anomaly.
-
公开(公告)号:US11520331B2
公开(公告)日:2022-12-06
申请号:US16236291
申请日:2018-12-28
Applicant: Intel Corporation
Inventor: Sara Baghsorkhi , Justin Gottschlich , Alexander Heinecke , Mohammad Mejbah Ul Alam , Shengtian Zhou , Sridhar Sharma , Patrick Andrew Mead , Ignacio Alvarez , David Gonzalez Aguirre , Kathiravetpillai Sivanesan , Jeffrey Ota , Jason Martin , Liuyang Lily Yang
Abstract: Methods, apparatus, systems and articles of manufacture are disclosed that provide an apparatus to analyze vehicle perspectives, the apparatus comprising a profile generator to generate a first profile of an environment based on a profile template and first data generated by a first vehicle; a data analyzer to: determine a difference between the first profile and a second profile obtained from a first one of one or more nodes in the environment; and in response to a trigger event, update the first profile based on the difference; and a vehicle control system to: in response to the trigger event, update a first perspective of the environment based on one or more of second data from the first one of the one or more nodes or the updated first profile; update a path plan for the first vehicle based on the updated first perspective; and execute the updated path plan.
-
公开(公告)号:US11038909B2
公开(公告)日:2021-06-15
申请号:US16235812
申请日:2018-12-28
Applicant: Intel Corporation
Inventor: Marcio Juliato , Liuyang Lily Yang , Manoj Sastry , Christopher Gutierrez , Shabbir Ahmed , Vuk Lesi
IPC: B60R16/02 , H04W4/48 , H04W12/122 , H04L29/06 , B60R16/023 , H04L29/08
Abstract: Methods, apparatus, systems and articles of manufacture are disclosed for anomaly detection and recovery. An apparatus to isolate a first controller in an autonomous vehicle includes a first controller to control a reference signal of the autonomous vehicle via a communication bus, a second controller to control the reference signal of the autonomous vehicle when the first controller is compromised, and a message neutralizer to neutralize messages transmitted by the first controller when the first controller is compromised, the neutralized messages to cause the first controller to become isolated from the communication bus.
-
公开(公告)号:US11902785B2
公开(公告)日:2024-02-13
申请号:US17545721
申请日:2021-12-08
Applicant: INTEL CORPORATION
Inventor: Liuyang Lily Yang , Debabani Choudhury , Sridhar Sharma , Kathiravetpillai Sivanesan , Justin Gottschlich , Zheng Zhang , Yair Yona , Xiruo Liu , Moreno Ambrosin , Kuilin Clark Chen
IPC: H04W12/12 , H04W4/40 , H04W12/06 , H04L9/32 , H04W12/122
CPC classification number: H04W12/12 , H04L9/3271 , H04W4/40 , H04W12/06 , H04W12/122
Abstract: Methods, apparatus, systems, and articles of manufacture are disclosed to detect attacks in V2X networks. An example apparatus includes a challenge handler to (a) transmit a first challenge packet to a first vehicle to request a transmission of a first response, (b) instruct a second challenge packet to be transmitted to a second vehicle to request a transmission of a second response, (c) increment a first counter when the first response is not obtained, (d) increment a second counter when the second response is not obtained, and (e) after repeating (a)-(d), determine that the first and second vehicles are phantom vehicles associated with an attacker with a half-duplex radio when at least one of the first or second counters satisfy a threshold, and a network interface to instruct a third vehicle associated with the V2X network to ignore future messages from the phantom vehicles based on the determination.
-
公开(公告)号:US20230188982A1
公开(公告)日:2023-06-15
申请号:US17550841
申请日:2021-12-14
Applicant: Intel Corporation
Abstract: A non-transitory computer-readable storage medium stores instructions to configure a base station for user equipment (UE) authentication in a wireless network and to cause the base station to perform an operation comprising decoding configuration signaling received from a PHY security function (PSF) of the wireless network. The configuration signaling includes a request for collection of a plurality of signal samples from the UE, the UE authenticated based on successful completion of a first authentication process. A response message is encoded for transmission to the PSF. The response message includes the plurality of UE signal samples. A trained machine learning model received from the PSF is decoded. The trained machine learning model associates the authenticated UE with an RF signature of the UE. The RF signature is based on the plurality of signal samples. A second authentication process of the UE is performed based on the trained model.
-
公开(公告)号:US20230095401A1
公开(公告)日:2023-03-30
申请号:US17483912
申请日:2021-09-24
Applicant: Intel Corporation
IPC: H04W36/00
Abstract: An apparatus and system to mitigate non-genuine handovers are described. The handovers include handovers based on fake measurements and handovers to malicious cells. To mitigate these, a mitigation procedure is initiated when excessive handovers are detected. Location information obtained from the UE, estimation of PHY layer properties by the serving and/or target cell, or AI modeling of the best serving cell at the UE location is used to determine whether the handover is valid. If not, the handover is canceled and the UE is stopped from initiating new handovers for a specified time, the UE may be instructed to perform re-authentication with the network, and/or the serving cell recommends to the network authentication entity to revoke the UE authentication. To ensure that the target cell is legitimate, an AI model is used to classify the target cell as known/unknown and the result sent to the network in NAS signaling.
-
公开(公告)号:US11252567B2
公开(公告)日:2022-02-15
申请号:US16230971
申请日:2018-12-21
Applicant: Intel Corporation
Inventor: Liuyang Lily Yang , Debabani Choudhury , Sridhar Sharma , Kathiravetpillai Sivanesan , Justin Gottschlich , Zheng Zhang , Yair Yona , Xiruo Liu , Moreno Ambrosin , Kuilin Clark Chen
IPC: H04W12/12 , H04W4/40 , H04W12/06 , H04L9/32 , H04W12/122
Abstract: Methods, apparatus, systems, and articles of manufacture are disclosed to detect attacks in V2X networks. An example apparatus includes a challenge handler to (a) transmit a first challenge packet to a first vehicle to request a transmission of a first response, (b) instruct a second challenge packet to be transmitted to a second vehicle to request a transmission of a second response, (c) increment a first counter when the first response is not obtained, (d) increment a second counter when the second response is not obtained, and (e) after repeating (a)-(d), determine that the first and second vehicles are phantom vehicles associated with an attacker with a half-duplex radio when at least one of the first or second counters satisfy a threshold, and a network interface to instruct a third vehicle associated with the V2X network to ignore future messages from the phantom vehicles based on the determination.
-
-
-
-
-
-
-
-
-