Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Secure firmware updates for remote vehicles

a technology for remote vehicles and secure firmware updates, applied in the direction of securing communication, digital transmission, instruments, etc., can solve the problems of difficult to efficiently securely transfer firmware update files without expensive or hard-to-scale infrastructure, etc., to improve the functionality of digital hardware components and efficiently securely transfer firmware update files.

Inactive Publication Date: 2019-12-26
CHONGQING JINKANG NEW ENERGY VEHICLE CO LTD +1
View PDF0 Cites 15 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Benefits of technology

[0002]The present disclosure is directed to systems and methods of secure firmware updates for remote vehicles. A vehicle can include numerous digital hardware components that run or execute firmware. The firmware run by the digital hardware components can be updated periodically to improve the functionality of the digital hardware components. It can be challenging to securely transfer the firmware update file due to network topology issues, cybersecurity threats or attacks, or other accidental or malicious issues that can result in the firmware being altered. Further, it can be challenging to efficiently securely transfer firmware update files without expensive or hard to scale infrastructure.
[0003]Systems and methods of the present technical solution provide for secure firmware updates on remote vehicles. The present technical solution can provide an efficient, scalable system for securely transferring firmware updates to remote vehicles. For example, the present technical solution can combine a cryptographic hash (for example: sha256), a session management identifier and generate a digital signature stored in an immutable blockchain transaction. The digital signature can ensure data integrity of the firmware downloaded from a server to the vehicle during an over-the-air software update process. The vehicle can verify the firmware update by comparing a hash value of the firmware update file and the session identifier received from the blockchain with a hash value of the firmware update file and session identifier received from the server. Upon determining a match, the vehicle can proceed with installing the firmware update file.
[0004]At least one aspect is directed to a system to perform secure firmware updates on a remote vehicle. The system can include a data processing system. The data processing system can include one or more processors and memory. The data processing system can include one or more of a vehicle identification component, session handler component, firmware controller component, hash component and signature generation component. The data processing system can receive a request via a vehicle interface. The request can be for an update to a firmware executed by a component of a vehicle. The data processing system can identify a blockchain address for the vehicle based on the request. The data processing system can generate, responsive to the request, a session identifier for the request. The data processing system can identify a firmware update file responsive to the request. The data processing system can generate a digital signature based on a combination of the session identifier and a first hash value generated via application of a hash function to the firmware update file. The data processing system can provide, for storage in a block at the blockchain address, the digital signature. The data processing system can transmit the session identifier to the vehicle. The data processing system can transfer the firmware update file to the vehicle. Receipt of the firmware update file by the vehicle can cause the vehicle to verify the firmware update file prior to installation. The vehicle can verify the firmware update file based on a comparison of the digital signature retrieved from the block at the blockchain address with a second hash value generated via application of the hash function to the firmware update file received from the data processing system and the session identifier received from the data processing system.

Problems solved by technology

It can be challenging to securely transfer the firmware update file due to network topology issues, cybersecurity threats or attacks, or other accidental or malicious issues that can result in the firmware being altered.
Further, it can be challenging to efficiently securely transfer firmware update files without expensive or hard to scale infrastructure.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Secure firmware updates for remote vehicles
  • Secure firmware updates for remote vehicles
  • Secure firmware updates for remote vehicles

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0015]Following below are more detailed descriptions of various concepts related to, and implementations of, methods, apparatuses, and systems of network-based path generation for a vehicle controller. The various concepts introduced above and discussed in greater detail below may be implemented in any of numerous ways.

[0016]The present disclosure is directed to systems and methods of secure firmware updates for remote vehicles. Vehicles such as automobiles can include numerous digital hardware components that run or execute firmware. The digital hardware components can perform critical functions of the vehicle or be integral to critical vehicle systems. The firmware run by the digital hardware components can be updated periodically to improve the functionality of the digital hardware components. As errors, faults, issues, or improvements are identified for the hardware component, a server can transfer a firmware update for the component. However, due to the vehicle being remote fro...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

Systems and methods of secure firmware updates on remote vehicles are provided. The system receives a request from a vehicle for an update to vehicle firmware, and identifies a blockchain address for the vehicle. The system generates a session identifier and identifies a firmware update file. The system generates a digital signature based on a combination of the session identifier and a first hash value of the firmware update file. The system provides, for storage in a block at the blockchain address, the digital signature. The system transmits the session identifier to the vehicle. The system transfers the firmware update file to the vehicle. The vehicle verifies the firmware update file using the digital signature retrieved from the block at the blockchain address, a second hash value of the firmware update file received from the data processing system, and the session identifier received from the data processing system.

Description

BACKGROUND[0001]Vehicles, such as automobiles, can include electronic components. The electronic components can perform functions on or for the vehicle. The vehicle can use the electronic components to facilitate vehicle-related functions, such as driving.SUMMARY[0002]The present disclosure is directed to systems and methods of secure firmware updates for remote vehicles. A vehicle can include numerous digital hardware components that run or execute firmware. The firmware run by the digital hardware components can be updated periodically to improve the functionality of the digital hardware components. It can be challenging to securely transfer the firmware update file due to network topology issues, cybersecurity threats or attacks, or other accidental or malicious issues that can result in the firmware being altered. Further, it can be challenging to efficiently securely transfer firmware update files without expensive or hard to scale infrastructure.[0003]Systems and methods of th...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(United States)
IPC IPC(8): H04L9/32G06F8/65H04L9/06
CPCH04L9/0643H04L9/3226H04L2209/38H04L9/3247G06F8/65G06F8/654H04L2209/84H04L9/3239H04L9/50
Inventor SU, AO-JAN
Owner CHONGQING JINKANG NEW ENERGY VEHICLE CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products