Supercharge Your Innovation With Domain-Expert AI Agents!

System and method for connected vehicle cybersecurity

A network security and vehicle technology, applied in the field of network security, can solve the problems of harmfulness of car owners, data leakage, harm of malicious actors, etc.

Active Publication Date: 2020-05-01
UPSTREAM SECURITY LTD
View PDF3 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

In addition, due to the presence of controlled fleets, widespread cyberattacks on fleets comprising large numbers of vehicles may occur simultaneously, allowing malicious actors to inflict greater damage
Also, the privacy of connected vehicles is a concern as data breaches from connected vehicles can also be harmful to vehicle owners

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • System and method for connected vehicle cybersecurity
  • System and method for connected vehicle cybersecurity
  • System and method for connected vehicle cybersecurity

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0017] It is important to note that the embodiments disclosed herein are only examples of the many advantageous uses of the innovations herein. In general, statements made in the specification of the present application do not necessarily limit any of the various claimed embodiments. Furthermore, some statements may apply to some inventive features but not to others. In general, unless otherwise indicated, singular elements may be plural and vice versa without loss of generality. In the drawings, like reference numerals refer to like parts throughout the several views.

[0018] Various disclosed embodiments include methods and systems for preventing connected attacks to secure connected vehicles and connected vehicle services. Accordingly, the disclosed embodiments provide networked vehicle cybersecurity techniques. Vehicle data is collected and correlated from multiple data sources to monitor vehicle behavior or vehicle service behavior over time and to detect changes in v...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

A system and method for connected vehicle cybersecurity. The method includes creating a normal behavior model based on a first set of data, the first set of data including at least one first event with respect to at least one connected vehicle, wherein the first set of data is collected from a plurality of data sources; detecting an anomaly based on the normal behavior model and a second set of data, the second set of data including a second event with respect to the at least one connected vehicle, wherein each of the first set of data and the second set of data includes vehicle data related to operation of the at least one connected vehicle, wherein each event represents a communication with the at least one connected vehicle; determining, based on the detected anomaly, at least one mitigation action; and causing implementation of the at least one mitigation action.

Description

[0001] Cross References to Related Applications [0002] This application claims the benefit of U.S. Provisional Patent Application No. 62 / 537,608 (currently pending), filed July 27, 2017, the contents of which are incorporated herein by reference. technical field [0003] The present disclosure relates generally to connected autonomous vehicles, and more particularly to cybersecurity for connected autonomous vehicles and fleets. Background technique [0004] As computer technology has developed, computerized navigation and control systems used in vehicles have been created to improve the driver's experience and allow remote-controlled transportation of people and goods. These computerized automotive systems can provide guided or assisted driving functions, or control the vehicle autonomously. To this end, the computerized driving system can access and control key vehicle functions, such as unlocking the car, turning the engine on and off, controlling steering, and braking....

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04W4/40H04W12/12G06N20/00H04W12/122
CPCH04L63/1441H04L63/20H04W4/44H04L63/1416G06N20/00
Inventor Y·阿佩尔Y·利维
Owner UPSTREAM SECURITY LTD
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More