Unlock instant, AI-driven research and patent intelligence for your innovation.

Authentication rights enhancement on transport services

A secondary authentication and mobile device technology, applied in transportation and packaging, digital data authentication, transmission systems, etc., can solve problems such as hacker attacks, relay attacks, jumping, etc., achieve safe user experience, and reduce security attacks.

Pending Publication Date: 2022-05-06
FORD GLOBAL TECH LLC
View PDF1 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

While the communications themselves can be encrypted by other means, there is the potential for relay attacks or other hacking attacks because the lack of continuous bonding can make radio frequency (RF) or optical signal channel hopping predictable
Secondary confirmation factors may make unbonded communication channels less vulnerable to relay and other wireless attacks
Conventional vehicle authentication systems, such as the system described in the '803 publication, may not include secondary validation factors that can be selectively or automatically triggered based on predefined risk factors

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Authentication rights enhancement on transport services
  • Authentication rights enhancement on transport services
  • Authentication rights enhancement on transport services

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0019] The present disclosure will be described more fully hereinafter with reference to the accompanying drawings, in which exemplary embodiments of the disclosure are shown and not intended to be limiting.

[0020] figure 1 Depicted is an exemplary computing environment 100 that may include a vehicle 105 that includes a vehicle computer 145 and a vehicle control unit (VCU) 165 that typically includes a A plurality of electronic control units (ECUs) 117 in communication. The nomadic device 120 (which may be associated with the user 140 and the vehicle 105) may interface with the vehicle computer 145 using wired and / or wireless communication protocols and transceivers. The nomadic device 120 may be communicatively coupled to the vehicle 105 via one or more networks 125, which may communicate via one or more wireless channels 130, and / or the nomadic device may use proximity field communication (NFC) protocol, Protocol, Wi-Fi, Li-Fi, Voice, Ultra Wideband (UWB), and other po...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides authentication authority enhancement on transportation service. The present disclosure relates to an automotive computer that uses an authentication manager to communicate with a mobile device to increase and / or decrease user rights to determine a level of vehicle control or feature access granted to a user. The authentication manager may increase or decrease the user rights to a standard occupant state until the authentication manager has confirmed a promoted state of the user via a cloud security challenge question or via a local identification method, such as using the mobile device authentication feature. The process may additionally be triggered based on environmental or contextual use cases, such as high traffic conditions, local network attacks, or transport of sensitive cargo. The system may utilize the authentication to perform out-of-band pairing of the mobile device and the vehicle, which may increase additional security.

Description

technical field [0001] The present disclosure relates to user authentication, and more particularly to controlling permission levels of mobile devices connected to automotive computers. Background technique [0002] Establishing a wireless, seamless data connection between a mobile device and an autonomous vehicle can be challenging using current methods of mobile device authentication. An unencrypted or untethered wireless mobile device connection between the vehicle and the mobile device may create a security breach. Lack of binding may increase vulnerability to relay attacks. A relay attack involves intercepting information with fraudulent intent for its future use. For example, radio signals or authentication messages between two devices (or people) can be obtained, manipulated or spoofed. In other respects, an eavesdropping attacker may attempt to locate, intercept, and store signals directly from a single device (e.g., a vehicle key fob) that is constantly emitting ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04W12/48H04W12/084H04W12/06H04W12/122H04W12/00H04W12/0431H04W12/47G06F21/45G06F21/60
CPCH04W12/48H04W12/084H04W12/068H04W12/122H04W12/009H04W12/0431H04W12/47G06F21/45G06F21/602G06F21/604G06F2221/2141H04W12/08H04L63/105H04L67/12H04L9/3213H04L2209/80B60R25/241B60R2325/101B60R2325/103B60R2325/106B60R2325/108B60R2325/205H04W76/10H04W12/06
Inventor 阿里·哈桑尼哈米德·M·格尔吉里卡梅伦·史密斯维维卡纳德·埃兰戈维安约翰·罗伯特·范维梅尔施A·豪勒
Owner FORD GLOBAL TECH LLC