Unlock instant, AI-driven research and patent intelligence for your innovation.

Method and system for detecting intrusion in a vehicle system

A computing system and embedded device technology, applied in the field of improving the security of vehicle electronic devices, can solve problems such as huge organization, harmfulness, etc.

Pending Publication Date: 2021-12-14
CUMMINS INC
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Therefore, it is imperative for manufacturers to adopt such security measures in connected trucks, as cyber-attacks in this group are often massive and extremely harmful to the organization

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and system for detecting intrusion in a vehicle system
  • Method and system for detecting intrusion in a vehicle system
  • Method and system for detecting intrusion in a vehicle system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0029] In the following detailed description, reference is made to the accompanying drawings, which form a part hereof, and in which are shown by way of illustrations specific embodiments which practice the disclosure. These embodiments are described in sufficient detail to enable those skilled in the art to practice the disclosure, and it is to be understood that other embodiments may be utilized and structural changes may be made without departing from the scope of the present disclosure. . Accordingly, the following detailed description is not to be taken in a limiting sense, but the scope of the present disclosure is defined only by the appended claims and their equivalents.

[0030]Reference throughout this specification to "one embodiment," "an embodiment," or similar language means that a particular feature, structure, or characteristic described in connection with the embodiment is included in at least one embodiment of the present disclosure. Appearances of the phras...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

Methods and systems of improving security of a computing system having a network of embedded devices are disclosed. The method includes starting a timer of a predetermined length of time, obtaining an expected number of cyclic messages to be received within the predetermined length of time, incrementing a message counter each time a cyclic message is received within the predetermined length of time, incrementing a set counter in response to an actual number of cyclic messages received by the end of the predetermined length of time exceeding the expected number of cyclic messages to be received by a first threshold value, and detecting an intrusion in the system in response to the set counter exceeding a second threshold value by the end of the predetermined length of time.

Description

[0001] Cross References to Related Applications [0002] This application claims priority to U.S. Provisional Application No. 62 / 846,999, filed May 13, 2019, the entire contents of which are incorporated herein by reference. technical field [0003] The present disclosure relates generally to computer security, and more particularly to improving the security of vehicle electronics. Background technique [0004] Recently, more and more vehicles are being manufactured as "connected vehicles" or vehicles equipped with Internet access and often also wireless local area networks. Compared to their non-connected predecessors, these connected vehicles enjoy the advantage of accessing a wealth of information and services in the form of shared data between the network and the vehicle. There are different types of connections: vehicle-to-infrastructure (V2I), vehicle-to-vehicle (V2V), vehicle-to-cloud (V2C), vehicle-to-pedestrian (V2P), and vehicle-to-everything (V2X). However, the ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/55B60R25/10B60R25/30B60R25/20
CPCG06F21/554H04L63/1408H04L2012/40215H04L63/1458H04L2012/40273H04L12/40H04W4/48B60R25/20B60R25/30H04L63/1416
Inventor S·K·库玛尔S·慕克吉H·彼邵普C·S·约克A·T·希勒里
Owner CUMMINS INC