-
公开(公告)号:US11601282B1
公开(公告)日:2023-03-07
申请号:US17080470
申请日:2020-10-26
发明人: Matthew Lewis Floyd , Leroy Luther Smith, Jr. , Brittney Benzio , Nathan Barnard , Shannon Marie Lowry
摘要: A computer system for verifying vehicle software configuration may be provided. The computer system may include a processor and a non-transitory, tangible, computer-readable storage medium having instructions stored thereon that, in response to execution by the processor, cause the processor to: (1) transmit, to a vehicle computing system, an authentication request including a hash algorithm specification; (2) receive, from the vehicle computing system, a current configuration hash value and a vehicle identifier; (3) retrieve a trusted data block from a memory based upon the vehicle identifier, the trusted data block including a stored configuration hash value and a smart contract code segment; (4) execute the smart contract code segment, the smart contract code segment including a failsafe code segment; and/or (5) transmit the authentication response to the vehicle computing system, and cause the vehicle computing system to execute the failsafe code segment.
-
公开(公告)号:US11050849B1
公开(公告)日:2021-06-29
申请号:US16834937
申请日:2020-03-30
发明人: Matthew Lewis Floyd , Leroy Luther Smith, Jr. , Brittney Benzio , Nathan Barnard , Shannon Marie Lowry
摘要: A computer system for verifying vehicle software configuration may be provided. The computer system may include a processor and a non-transitory, tangible, computer-readable storage medium having instructions stored thereon that, in response to execution by the processor, cause the processor to: (1) retrieve a trusted data block from a memory, the trusted data block including a stored configuration hash value, a smart contract code segment, and a failsafe code segment; (2) generate a current configuration hash value based on at least one software module by executing the smart contract code segment; (3) determine that the current configuration hash value is invalid based on the stored configuration hash value by executing the smart contract code segment; and/or (4) execute the failsafe code segment, in response to determining that the current configuration hash value is invalid.
-
公开(公告)号:US11811883B2
公开(公告)日:2023-11-07
申请号:US17824698
申请日:2022-05-25
发明人: Matthew Lewis Floyd , Leroy Luther Smith, Jr. , Brittney Benzio , Nathan Barnard , Shannon Marie Lowry
IPC分类号: H04L9/32 , H04L67/00 , H04L67/12 , H04W4/40 , B60W50/02 , B60W50/04 , G05D1/00 , B60W50/029 , G05D1/02 , G06F21/54 , H04W12/06 , H04W12/30 , G07C5/00 , H04L9/06
CPC分类号: H04L67/34 , B60W50/0205 , B60W50/029 , B60W50/045 , G05D1/0088 , G05D1/0214 , G06F21/54 , G07C5/008 , H04L9/0643 , H04L9/3236 , H04L9/3239 , H04L9/3242 , H04L9/3247 , H04L67/12 , H04W4/40 , H04W12/06 , H04W12/30 , B60W2050/0292 , B60W2050/046 , G05D2201/0213 , H04L2209/80 , H04L2209/84
摘要: In one aspect, a computer system for vehicle configuration verification, and/or detecting unauthorized vehicle modification may be provided. In some exemplary embodiments, the computer system may include a processor and a non-transitory, tangible, computer-readable storage medium having instructions stored thereon that, in response to execution by the processor, cause the processor to perform operations including: (1) receiving a vehicle image, including a vehicle identifier and at least one software module; (2) calculating a configuration hash value of the at least one software module; generating a first data block including the configuration hash value, a first index value, the vehicle identifier, and a digital signature; (3) storing the first data block in a memory; and/or (4) transmitting the first data block to any number of network participants using a distributed network to facilitate vehicle software configuration verification.
-
公开(公告)号:US10826706B1
公开(公告)日:2020-11-03
申请号:US16026930
申请日:2018-07-03
发明人: Matthew Lewis Floyd , Leroy Luther Smith, Jr. , Brittney Benzio , Nathan Barnard , Shannon Marie Lowry
摘要: A computer system for verifying vehicle software configuration may be provided. The computer system may include a processor and a non-transitory, tangible, computer-readable storage medium having instructions stored thereon that, in response to execution by the processor, cause the processor to: (1) transmit, to a vehicle computing system, an authentication request including a hash algorithm specification; (2) receive, from the vehicle computing system, a current configuration hash value and a vehicle identifier; (3) retrieve a trusted data block from a memory based upon the vehicle identifier, the trusted data block including a stored configuration hash value and a smart contract code segment; (4) execute the smart contract code segment, the smart contract code segment including a failsafe code segment; and/or (5) transmit the authentication response to the vehicle computing system, and cause the vehicle computing system to execute the failsafe code segment.
-
公开(公告)号:US11349669B1
公开(公告)日:2022-05-31
申请号:US16026865
申请日:2018-07-03
发明人: Matthew Lewis Floyd , Leroy Luther Smith, Jr. , Brittney Benzio , Nathan Barnard , Shannon Marie Lowry
摘要: In one aspect, a computer system for vehicle configuration verification, and/or detecting unauthorized vehicle modification may be provided. In some exemplary embodiments, the computer system may include a processor and a non-transitory, tangible, computer-readable storage medium having instructions stored thereon that, in response to execution by the processor, cause the processor to perform operations including: (1) receiving a vehicle image, including a vehicle identifier and at least one software module; (2) calculating a configuration hash value of the at least one software module; generating a first data block including the configuration hash value, a first index value, the vehicle identifier, and a digital signature; (3) storing the first data block in a memory; and/or (4) transmitting the first data block to any number of network participants using a distributed network to facilitate vehicle software configuration verification.
-
公开(公告)号:US11088842B1
公开(公告)日:2021-08-10
申请号:US16026896
申请日:2018-07-03
发明人: Matthew Lewis Floyd , Leroy Luther Smith, Jr. , Brittney Benzio , Nathan Barnard , Shannon Marie Lowry
摘要: In one aspect, a computer system for verifying vehicle software configuration may be provided. In some exemplary embodiments, the computer system may include a processor and a non-transitory, tangible, computer-readable storage medium having instructions stored thereon that, in response to execution by the processor, cause the processor to: (1) transmit an authentication request to a vehicle computing system including a hash algorithm specification; (2) receive, from the vehicle computing system, a current configuration hash value and a vehicle identifier; (3) retrieve a trusted data block from a memory based upon the vehicle identifier; (4) compare the current configuration hash value to a stored configuration hash value included in the trusted data block; and (5) transmit an authentication response to the vehicle computing system based upon the comparison.
-
公开(公告)号:US10666767B1
公开(公告)日:2020-05-26
申请号:US16026941
申请日:2018-07-03
发明人: Matthew Lewis Floyd , Leroy Luther Smith, Jr. , Brittney Benzio , Nathan Barnard , Shannon Marie Lowry
摘要: A computer system for verifying vehicle software configuration may be provided. The computer system may include a processor and a non-transitory, tangible, computer-readable storage medium having instructions stored thereon that, in response to execution by the processor, cause the processor to: (1) retrieve a trusted data block from a memory, the trusted data block including a stored configuration hash value, a smart contract code segment, and a failsafe code segment; (2) generate a current configuration hash value based on at least one software module by executing the smart contract code segment; (3) determine that the current configuration hash value is invalid based on the stored configuration hash value by executing the smart contract code segment; and/or (4) execute the failsafe code segment, in response to determining that the current configuration hash value is invalid.
-
-
-
-
-
-