US20180302228A1 - Systems and methods for secure communications in vehicle telematics systems - Google Patents
Systems and methods for secure communications in vehicle telematics systems Download PDFInfo
- Publication number
- US20180302228A1 US20180302228A1 US15/945,730 US201815945730A US2018302228A1 US 20180302228 A1 US20180302228 A1 US 20180302228A1 US 201815945730 A US201815945730 A US 201815945730A US 2018302228 A1 US2018302228 A1 US 2018302228A1
- Authority
- US
- United States
- Prior art keywords
- vehicle telematics
- vehicle
- security
- telematics device
- memory
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Abandoned
Links
- 230000006854 communication Effects 0.000 title claims abstract description 34
- 238000004891 communication Methods 0.000 title claims abstract description 33
- 238000000034 method Methods 0.000 title description 23
- 238000010295 mobile communication Methods 0.000 claims description 34
- 238000012423 maintenance Methods 0.000 claims description 23
- 230000005540 biological transmission Effects 0.000 claims description 10
- 230000004044 response Effects 0.000 claims 2
- 238000010586 diagram Methods 0.000 description 11
- 230000001413 cellular effect Effects 0.000 description 8
- 230000001133 acceleration Effects 0.000 description 5
- 238000004422 calculation algorithm Methods 0.000 description 5
- 238000005259 measurement Methods 0.000 description 4
- 238000012986 modification Methods 0.000 description 3
- 230000004048 modification Effects 0.000 description 3
- 230000008569 process Effects 0.000 description 3
- 230000000116 mitigating effect Effects 0.000 description 2
- 238000013515 script Methods 0.000 description 2
- 238000012546 transfer Methods 0.000 description 2
- 102100034112 Alkyldihydroxyacetonephosphate synthase, peroxisomal Human genes 0.000 description 1
- 101000799143 Homo sapiens Alkyldihydroxyacetonephosphate synthase, peroxisomal Proteins 0.000 description 1
- 238000004458 analytical method Methods 0.000 description 1
- QVGXLLKOCUKJST-UHFFFAOYSA-N atomic oxygen Chemical compound [O] QVGXLLKOCUKJST-UHFFFAOYSA-N 0.000 description 1
- 238000013475 authorization Methods 0.000 description 1
- 230000008901 benefit Effects 0.000 description 1
- 238000004364 calculation method Methods 0.000 description 1
- 230000008859 change Effects 0.000 description 1
- 238000010276 construction Methods 0.000 description 1
- 230000001934 delay Effects 0.000 description 1
- 230000001419 dependent effect Effects 0.000 description 1
- 238000001514 detection method Methods 0.000 description 1
- 238000002405 diagnostic procedure Methods 0.000 description 1
- 238000005516 engineering process Methods 0.000 description 1
- 239000000835 fiber Substances 0.000 description 1
- 230000006870 function Effects 0.000 description 1
- 238000003780 insertion Methods 0.000 description 1
- 230000037431 insertion Effects 0.000 description 1
- 238000004519 manufacturing process Methods 0.000 description 1
- 238000012544 monitoring process Methods 0.000 description 1
- 230000003287 optical effect Effects 0.000 description 1
- 239000013307 optical fiber Substances 0.000 description 1
- 229910052760 oxygen Inorganic materials 0.000 description 1
- 239000001301 oxygen Substances 0.000 description 1
- 230000002093 peripheral effect Effects 0.000 description 1
- 238000012545 processing Methods 0.000 description 1
- 239000004065 semiconductor Substances 0.000 description 1
- 238000012360 testing method Methods 0.000 description 1
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3263—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving certificates, e.g. public key certificate [PKC] or attribute certificate [AC]; Public key infrastructure [PKI] arrangements
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/16—Implementing security features at a particular protocol layer
- H04L63/166—Implementing security features at a particular protocol layer at the transport layer
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0861—Generation of secret information including derivation or calculation of cryptographic keys or passwords
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0894—Escrow, recovery or storing of secret information, e.g. secret key escrow or cryptographic key storage
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/321—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving a third party or a trusted authority
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3247—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3271—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using challenge-response
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/009—Security arrangements; Authentication; Protecting privacy or anonymity specially adapted for networks, e.g. wireless sensor networks, ad-hoc networks, RFID networks or cloud networks
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/03—Protecting confidentiality, e.g. by encryption
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/04—Key management, e.g. using generic bootstrapping architecture [GBA]
- H04W12/041—Key generation or derivation
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/06—Authentication
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/06—Authentication
- H04W12/068—Authentication using credential vaults, e.g. password manager applications or one time password [OTP] applications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/06—Authentication
- H04W12/069—Authentication using certificates or pre-shared keys
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W4/00—Services specially adapted for wireless communication networks; Facilities therefor
- H04W4/12—Messaging; Mailboxes; Announcements
- H04W4/14—Short messaging services, e.g. short message services [SMS] or unstructured supplementary service data [USSD]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W4/00—Services specially adapted for wireless communication networks; Facilities therefor
- H04W4/30—Services specially adapted for particular environments, situations or purposes
- H04W4/40—Services specially adapted for particular environments, situations or purposes for vehicles, e.g. vehicle-to-pedestrians [V2P]
- H04W4/44—Services specially adapted for particular environments, situations or purposes for vehicles, e.g. vehicle-to-pedestrians [V2P] for communication between vehicles and infrastructures, e.g. vehicle-to-cloud [V2C] or vehicle-to-home [V2H]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/80—Wireless
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/84—Vehicles
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/12—Protocols specially adapted for proprietary or special-purpose networking environments, e.g. medical networks, sensor networks, networks in vehicles or remote metering networks
Definitions
- GPS Global Positioning System
- GPS Global Positioning System
- Many telematics systems incorporate a Global Positioning System (GPS) receiver that can be used to obtain the location of a vehicle at a certain measured time. Using the signals received by the GPS receiver, the heading information of the vehicle can be determined.
- GPS receiver can determine velocity information in a variety of ways including, but not limited to, measuring the Doppler shift of the received signals and by comparing the location of a vehicle at a plurality of measured times. The acceleration of the vehicle can be determined as the change in speed divided by the time between the measurements.
- a GPS receiver's ability to determine acceleration can be limited due to the dependence of the measurement upon factors such as, but not limited to, reception and satellite availability.
- a GPS receiver can also be configured to provide time data.
- measurements determined via a GPS receiver can contain errors that affect the accuracy of the measured information.
- GPS signals are vulnerable to signal delays, inconsistencies of atmospheric conditions that affect the speed of the GPS signals as they pass through Earth's atmosphere, and multipath distortions. Additionally, other factors not listed can influence GPS signals and result in measurement errors.
- FIG. 2A is a conceptual illustration of a vehicle telematics device in accordance with an embodiment.
- FIG. 2B is a conceptual illustration of another vehicle telematics device in accordance with an embodiment.
- FIG. 3 is a chart showing example threat descriptions and corresponding security risk levels.
- FIG. 4 is a conceptual block diagram of a vehicle telematics system having existing security (e.g., base level security).
- existing security e.g., base level security
- FIG. 6 is a conceptual block diagram of a vehicle telematics system having level-2 security (e.g., full TLS).
- level-2 security e.g., full TLS
- FIG. 7 is a tree diagram showing a public key infrastructure (PKI) for the vehicle telematics system, which has level-2 security.
- PKI public key infrastructure
- FIG. 8 is a conceptual block diagram of a system for provisioning a vehicle telematics system having level-2 security.
- the operational state of a vehicle is utilized to determine if a vehicle telematics device should transmit and/or receive data.
- vehicle ignition state i.e. the operational status of the vehicle
- Information indicative of vehicle ignition state i.e. vehicle status data
- vehicle status data can be ascertained by observing characteristics of the vehicle including but not limited to the power supplied by the vehicle, vehicle vibration, communications on an OBD II port (e.g., on-board diagnostics connector) or other vehicle data bus line, and/or vehicle position information.
- OBD II port e.g., on-board diagnostics connector
- Vehicle telematics systems in accordance with embodiments can transmit a variety of data between a remote server system and a vehicle telematics device using a mobile communications device.
- a conceptual diagram of a vehicle telematics system 100 in accordance with an embodiment is shown in FIG. 1 .
- the vehicle telematics system 100 includes one or more vehicle telematics devices ( 110 , 110 ′, etc.).
- the vehicle telematics device 110 can communicate with a mobile communications device 116 , a vehicle data bus 112 , and/or an input/output (I/O) interface 114 as appropriate to the requirements of specific applications of embodiments.
- I/O input/output
- the network 120 is the Internet. In many embodiments, the network 120 is any wired or wireless network, such as a cellular network, between the vehicle telematics device 110 ′ and/or the mobile communications device 116 and the remote server system 130 . In a number of embodiments, the remote server system 130 is implemented using a single server system. In several embodiments, the remote server system 130 is implemented using multiple server systems.
- the vehicle telematics device 110 is installed in a vehicle having a vehicle data bus 112 .
- the vehicle telematics device 110 is connected to a vehicle diagnostic connector that provides access to the vehicle data bus 112 .
- the vehicle telematics device 110 can obtain data from any of a variety of vehicle devices connected to the vehicle data bus 112 utilizing any of a variety of techniques as appropriate to the requirements of specific applications of embodiments.
- Vehicle devices can include, but are not limited to, engine sensors, electronic control unit (ECU) devices, alternator sensors, vibration sensors, voltage sensors, oxygen sensors, Global Positioning System (GPS) receivers, ignition devices, weight sensors, wireless network devices, and/or acceleration determination devices.
- ECU electronice control unit
- GPS Global Positioning System
- the vehicle telematics device 110 can include any of a variety of sensors and/or devices, including those described herein with respect to the vehicle data bus and any described in more detail herein, to obtain data regarding the status of the vehicle.
- the vehicle telematics device 110 can also communicate with any of a variety of sensors and/or devices using the I/O interface 114 .
- the I/O interface 114 can be any connection, including wired and wireless connections, as appropriate to the requirements of specific applications of embodiments.
- the vehicle telematics device 110 can execute scripts to read data and/or perform particular processes.
- the vehicle telematics device 110 can be self-powered and/or connected into the electrical system of the vehicle in which the vehicle telematics device 110 is installed. In a variety of embodiments, the vehicle telematics device is powered via the vehicle data bus 112 and/or the I/O interface 114 . In many embodiments, the vehicle telematics device 110 utilizes a Global Positioning System (GPS) receiver in order to determine the location, speed, and/or acceleration of the vehicle.
- GPS Global Positioning System
- the vehicle telematics device 110 obtains location data from the mobile communications device 116 .
- location-determining techniques such as cellular tower triangulation, wireless network geolocation techniques, and dead reckoning techniques, could be utilized as appropriate to the requirements of specific applications of embodiments.
- the vehicle telematics device 110 , mobile communication device 116 , and/or remote server system 130 provides a user interface allowing for visualizing and interacting with the data transmitted and/or received between the systems.
- the vehicle telematics device 110 , mobile communications device 116 , and/or remote server system 130 provides an interface, such as an application programming interface (API) or web service that provides some or all of the data to third-party systems for further processing. Access to the interface can be open and/or secured using any of a variety of techniques, such as by using client authorization keys, as appropriate to the requirements of specific applications.
- API application programming interface
- Vehicle telematics devices in accordance with embodiments can transmit and receive data via a mobile communications device.
- a conceptual illustration of a vehicle telematics device in accordance with an embodiment is shown in FIG. 2A .
- the vehicle telematics device 110 includes a processor 210 and a security chip 215 in communication with memory 230 .
- the vehicle telematics device 110 can also include one or more communication interfaces 220 capable of sending and receiving data.
- the communication interface 220 is in communication with the processor 210 , the security chip 215 , the memory 230 , and/or the sensor device(s) 240 .
- FIG. 2B is a conceptual illustration of the vehicle telematics device 110 ′ in accordance with an embodiment.
- the vehicle telematics device 110 ′ includes the mobile communications device 116 coupled to the communications interface 220 to communicate with the remote server system 130 over the network 120 .
- the vehicle telematics application 232 can direct the processor 210 and/or the security chip 215 to perform a variety of secure communication processes, a number of which that can be performed in accordance with embodiments further described herein.
- a memory includes circuitry such as, but not limited to, memory cells constructed using transistors, that are configured to store instructions.
- a processor can include logic gates formed from transistors (or any other device) that dynamically perform actions based on the instructions stored in the memory.
- the instructions are embodied in a configuration of logic gates within the processor to implement and/or perform actions described by the instructions. In this way, the systems and methods described herein can be performed utilizing both general-purpose computing hardware and by single-purpose devices.
- FIG. 3 is a chart 300 showing example threat descriptions 305 and corresponding security risk levels 310 .
- Example threat descriptions 305 having a security risk level 310 of “critical” include at least the following: Over-the-Air (OTA) updates that are not encrypted or signed, OTA updates that are initiated without authentication, communications security (COMSEC) having no end-to-end encryption, man-in-the-middle (MITM) attack (especially on Global System for Mobile Communications (GSM)), and a Short Message Service (SMS) interface that is not authenticated (e.g., subject to MITM attacks).
- OTA Over-the-Air
- COMSEC communications security
- MITM man-in-the-middle
- SMS Short Message Service
- Example threat descriptions 305 having a security risk level 310 of “high” include at least the following: Domain Name System (DNS) spoofing (e.g., communication sent to wrong server) and information disclosure in an Assisted Global Positioning System (A-GPS) component.
- DNS Domain Name System
- A-GPS Assisted Global Positioning System
- the vehicle telematics system 100 may undergo other threats not shown in FIG. 3 .
- a primary security threat is remote access by an external computing device.
- an external computing device might attack the vehicle telematic system 100 according to one of the threat descriptions 305 listed in FIG. 3 .
- a secondary (non-primary) threat is physical access to the vehicle telematics system 100 .
- FIG. 4 is a conceptual block diagram of a vehicle telematics system 400 having existing security (e.g., base level security).
- the vehicle telematics device 110 can communicate with a maintenance server 434 , a customer server 432 , and/or the mobile communications device 116 .
- the communication by the vehicle telematics device 110 with servers or other devices can be performed with various protocols, such as transmission control protocol (TCP)/internet protocol (IP) and/or user datagram protocol (UDP)/internet protocol (IP) for example.
- TCP transmission control protocol
- IP internet protocol
- UDP user datagram protocol
- IP internet protocol
- the vehicle telematics device 110 sends inbound encrypted data to a customer server 432 .
- the inbound encryption provides intercept protection (e.g., protection from an interception attack) on data generated by the vehicle telematics device 110 .
- the vehicle telematics device 110 and/or the customer server 432 stores a cryptographic key (e.g., public encryption key and/or private decryption key) as a configuration parameter.
- the customer server 432 sends password authentication to access the vehicle telematics device 110 .
- the password authentication provides remote access protection (e.g., protection from a remote access attack).
- the vehicle telematics device 110 and/or the customer server 432 stores password authentication as a configuration parameter.
- the mobile communications device 116 sends an SMS password to the vehicle telematics device.
- the SMS password provides remote access protection (e.g., protection from a remote access attack).
- the vehicle telematics device 110 and/or the mobile communications device 116 stores SMS password authentication as a configuration parameter.
- the vehicle telematics device can receive an attention (AT) command password from a local device (e.g., local terminal program).
- the AT command password provides local access protection (e.g., protection from a malicious user).
- the AT command password is typically the same password as the SMS password.
- FIG. 5 is a conceptual block diagram of a vehicle telematics system 500 having Level-1 security (e.g., enhanced access protection).
- the vehicle telematics device 110 can communicate with the maintenance server 434 , the customer server 432 , and/or the mobile communications device 116 .
- the vehicle telematics device 110 can send an encrypted inbound message to a customer server 432 .
- the encryption provides intercept protection (e.g., protection from an interception attack) on data generated by the vehicle telematics device 110 .
- the vehicle telematics device 110 and/or the customer server 432 stores cryptographic keys and settings as configuration parameters.
- the vehicle telematics device 110 can apply the encryption to the payload and vehicle identification number (VIN) in an option header.
- VIN vehicle identification number
- a cryptographic key is based on a proprietary stream cipher.
- the vehicle telematics device 110 typically does not apply encryption to the maintenance server interface.
- the customer server 432 can send authenticated outbound messages to one or more vehicle telematics devices 110 .
- the outbound authentication protects authenticity and integrity of messages that the customer server 432 sends to the vehicle telematics devices 110 .
- the sender e.g., customer server 432
- the authentication code or signature is calculated by using the entire message (e.g., options, header, payload, etc.).
- the customer server 432 can use, for example, keyed-hash message authentication code Merkle-Damg ⁇ rd hash function 5 (HMAC-MD5), 16-byte digest.
- HMAC-MD5 keyed-hash message authentication code Merkle-Damg ⁇ rd hash function 5
- the secret authentication keys used in the message authentication are unique to each vehicle telematics device 110 and each interface (e.g., inbound interface, maintenance interface at the vehicle telematics device 110 , etc.).
- the sender e.g., customer server 432
- the receiver e.g., vehicle telematics device 110
- the maintenance server 434 and/or the customer support server 432 can authenticate files transmitted to one or more vehicle telematics devices 110 .
- the file authentication provides file tampering protection by validating authenticity and integrity of files using a digital signature of the file transmitted along with the file.
- the maintenance server 434 and/or the customer support server 432 applies file authentication to all files transmitted to the vehicle telematics device 110 .
- the maintenance server 434 and/or the customer support server 432 supports the file authentication protocol.
- the maintenance server 434 can use, for example, an RSA Security/Secure Hash Algorithm two hundred and fifty-six (RSA/SHA-256) digital signature algorithm.
- the cryptographic keys used by the vehicle telematics device 110 to validate the digital signature of the file can be embedded in the software code of the vehicle telematics device 110 .
- the mobile communications device 116 can authenticate SMS messages for transmission to the vehicle telematics device 110 .
- the SMS authentication provides remote access protection (e.g., protection from a remote access attack).
- the mobile communications device 116 and the vehicle telematics device 110 can handle the SMS authentication.
- SMS authentication is substantially the same as message authentication (e.g., HMAC-MD5), which is discussed with reference to FIGS. 4 and 5 .
- the SMS authentication includes use of a cryptographic key that is similar to a cryptographic key used in message authentication. SMS authentication can complicate SMS access at the mobile communications device 116 and/or the vehicle telematics device 110 .
- a software application to handle SMS authentication may be required to be loaded onto the mobile communications device 116 and onto the vehicle telematics device 110 .
- the customer server 432 can generate authentication keys from a seed (e.g., some non-secret value) and an electronic serial number (ESN) of the vehicle telematics device 110 .
- a seed e.g., some non-secret value
- ESN electronic serial number
- the customer server 432 can provide and manage a seed and an authentication key for each for each vehicle telematics device 110 .
- Each vehicle telematics device 110 can generate a seed and an authentication key for each interface at the vehicle telematics device 110 .
- FIG. 6 is a conceptual block diagram of a vehicle telematics system 600 having level-2 security (e.g., full TLS).
- the vehicle telematics device 110 can communicate with the maintenance server 434 , the customer server 432 , and/or the mobile communications device 116 .
- the customer server 432 and/or the maintenance server 434 can communicate (e.g., transmit data) with the vehicle telematics device 110 via transmission control protocol (TCP)/transport layer security (TLS) session security.
- TCP transmission control protocol
- TLS transport layer security
- the devices of the vehicle telematics system 600 can support TLS for TCP and hypertext transfer protocol (HTTP).
- HTTP hypertext transfer protocol
- the devices of the vehicle telematics system 600 do not have user datagram protocol (UDP) support.
- the TCP/TLS session security provides protection via authentication and encryption.
- the vehicle telematics system 600 applies the TCP/TLS session security to all internet protocol (IP) interfaces (e.g., inbound interface, maintenance interface, etc.).
- IP internet protocol
- the TCP/TLS session security uses public-key cryptography with public key infrastructure (PKI) certificates.
- PKI public key infrastructure
- FIG. 7 is a tree diagram showing a public key infrastructure (PKI) 700 for the vehicle telematics system 600 , which has level-2 security.
- the PKI 700 shows how the vehicle telematics system 600 of FIG. 6 manages security certificates.
- a certificate authority or certification authority (CA) is a third-party computing device that issues digital certificates.
- a digital certificate certifies the ownership of a public encryption key by the named subject of the certificate. This allows other parties to rely upon signatures or on assertions made about the private decryption key that corresponds to the certified public encryption key.
- a certificate authority acts as a trusted third party that is trusted both by the subject (owner) of the certificate and by the party relying upon the certificate.
- the vehicle telematics system 100 may encrypt data at the vehicle telematics device 110 (e.g., base level security and level-1 security).
- the vehicle telematics system 100 may alternatively encrypt data at all end points, including the vehicle telematics device 110 , the customer server 432 , and the maintenance server 434 (e.g., level-2 security).
- the vehicle telematics system 100 may include direct message authentication, file authentication, message encryption, and file encryption (e.g., level-1 security and level-2 security).
- Level-2 TLS requires some important implementation considerations. Operations of a TLS stack require additional and sufficient memory resources (e.g., 30 kilobytes of RAM, 100 kilobytes of flash memory).
- a security stack is a group of software/firmware programs that work in tandem to produce a result or achieve a common goal (e.g., a goal of configuring a processor to carry out security operations). Sufficient memory for a TLS stack is unavailable in typical commercial products (e.g., typical vehicle telematics devices).
- a vehicle telematics device requires the addition of hardware, such as security chip 215 of FIG. 2A .
- the security chip 215 may be included on an add-on security processor board and is enabled to support a security stack (e.g., TLS stack).
- a security stack can be integrated into the processor 210 .
- the processor 210 is upgraded to have more RAM and more hardware cryptography support.
- One convenient solution is for the processor 210 to be a drop-in replacement for a processor that may presently be on a vehicle telematics device. With sufficient modification to the processor 210 , there may not be a need for the separate security chip 215 .
- the vehicle telematics device 110 can use a cellular radio Secure Socket interface (e.g., HTTPS). This embodiment is dependent on which cellular radios and which radio firmware (e.g., which type of mobile communications device 116 ) are deployed in the vehicle telematics device 110 . This embodiment is limited to cellular-only solutions without a dial-up network (DUN) (e.g., mobile data terminal (MDT) interface).
- DUN dial-up network
- MDT mobile data terminal
- the hardware security chip 215 supports cryptographic key generation. Accordingly, private encryption key insertion into the vehicle telematics device 110 is not required to take place offline at the factory (e.g., not required to take place online while the vehicle telematic system 100 is active).
- the security chip 215 can support secure storage of cryptographic keys and authentication certificates.
- the vehicle telematics device 110 includes hardware to support Bluetooth Low Energy (BLE) radio.
- BLE Bluetooth Low Energy
- Bluetooth communication capability enables the telematics device 110 to communicate with other devices (e.g., mobile communications device 116 ) via the Bluetooth wireless technology standard.
- the vehicle telematics device 110 includes level-3 physical security to protect against physical attacks.
- the vehicle telematics device 110 may include at least one of the following: read-out protection, secure boot for authentication of a run-time image, adding authentication to the attention command (ATCmd) interface, and/or encrypting data stored on an external memory device (e.g., flash memory coupled to the serial peripheral interface (SPI) bus).
- an external memory device e.g., flash memory coupled to the serial peripheral interface (SPI) bus.
- the elements of the embodiments are essentially the code segments to perform the necessary tasks.
- the program or code segments can be stored in a processor readable medium or transmitted by a computer data signal embodied in a carrier wave over a transmission medium or communication link.
- the “processor readable medium” may include any medium that can store or transfer information. Examples of the processor readable medium include an electronic circuit, a semiconductor memory device, a read only memory (ROM), a flash memory, an erasable programmable read only memory (EPROM), a floppy diskette, a CD-ROM, an optical disk, a hard disk, a fiber optic medium, a radio frequency (RF) link, etc.
- the computer data signal may include any signal that can propagate over a transmission medium such as electronic network channels, optical fibers, air, electromagnetic, RF links, etc.
- the code segments may be downloaded via computer networks such as the Internet, Intranet, etc.
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Mobile Radio Communication Systems (AREA)
Abstract
A vehicle telematics system is provided having secure communication capabilities between a vehicle telematics device and external computing devices. In one embodiment, the vehicle telematics device includes a processor; a memory coupled to the processor and storing a vehicle telematics application; and a security chip coupled to the processor and the memory, wherein the security chip is configured to support a Transport Layer Security (TLS) stack.
Description
- This non-provisional United States (U.S.) patent application claims the benefit of U.S. Provisional Patent Application No. 62/481,437 entitled SYSTEMS AND METHODS FOR SECURE COMMUNICATIONS IN VEHICLE TELEMATICS SYSTEMS filed on Apr. 4, 2017 by inventor Peter Hergesheimer, incorporated herein by reference.
- The embodiments generally relate to secure data communication of data by wireless networks.
- Telematics is the integrated use of telecommunications and informatics. Telematics units are installed in vehicles to provide a variety of telematics functionality in the vehicle. This functionality includes, but is not limited to, emergency warning systems, navigation functionality, safety warnings, and automated driving assistance. Telematics units are also capable of recording data related to the operation of the vehicle and providing that information for analysis, whether in real-time or during a time when the vehicle is being serviced. This information can be used in a variety of applications, such as fleet tracking, shipment tracking, insurance calculations, and in vehicle management and service.
- A Global Positioning System (GPS) is a space-based global navigation satellite system that utilizes a network of geo-synchronous satellites that can be utilized by a GPS receiver to determine its location. Many telematics systems incorporate a Global Positioning System (GPS) receiver that can be used to obtain the location of a vehicle at a certain measured time. Using the signals received by the GPS receiver, the heading information of the vehicle can be determined. A GPS receiver can determine velocity information in a variety of ways including, but not limited to, measuring the Doppler shift of the received signals and by comparing the location of a vehicle at a plurality of measured times. The acceleration of the vehicle can be determined as the change in speed divided by the time between the measurements. A GPS receiver's ability to determine acceleration can be limited due to the dependence of the measurement upon factors such as, but not limited to, reception and satellite availability. In addition to location information, a GPS receiver can also be configured to provide time data. However, measurements determined via a GPS receiver can contain errors that affect the accuracy of the measured information. In particular, GPS signals are vulnerable to signal delays, inconsistencies of atmospheric conditions that affect the speed of the GPS signals as they pass through Earth's atmosphere, and multipath distortions. Additionally, other factors not listed can influence GPS signals and result in measurement errors.
- The embodiments are best summarized by the claims included herein. Briefly, systems and methods for secure communications in vehicle telematics systems in accordance with the embodiments are disclosed.
-
FIG. 1 is a conceptual illustration of a vehicle telematics system in accordance with an embodiment. -
FIG. 2A is a conceptual illustration of a vehicle telematics device in accordance with an embodiment. -
FIG. 2B is a conceptual illustration of another vehicle telematics device in accordance with an embodiment. -
FIG. 3 is a chart showing example threat descriptions and corresponding security risk levels. -
FIG. 4 is a conceptual block diagram of a vehicle telematics system having existing security (e.g., base level security). -
FIG. 5 is a conceptual block diagram of a vehicle telematics system having Level-1 security (e.g., enhanced access protection). -
FIG. 6 is a conceptual block diagram of a vehicle telematics system having level-2 security (e.g., full TLS). -
FIG. 7 is a tree diagram showing a public key infrastructure (PKI) for the vehicle telematics system, which has level-2 security. -
FIG. 8 is a conceptual block diagram of a system for provisioning a vehicle telematics system having level-2 security. -
FIG. 9 is a chart showing example mitigation techniques for various threat descriptions and corresponding security risk levels. - In the following detailed description of the embodiments, numerous specific details are set forth in order to provide a thorough understanding. However, it will be obvious to one skilled in the art that the embodiments may be practiced without these specific details. In other instances, well known methods, procedures, components, and circuits have not been described in detail so as not to unnecessarily obscure aspects of the embodiments.
- The embodiments include a method, an apparatus, and a system for secure communications in vehicle telematics systems. Many vehicles are equipped with a telematics unit. These telematics units can obtain and/or measure a variety of data regarding the conditions and/or location of the vehicle along with receiving and transmitting data to remote server systems. In order to facilitate these communications, the telematics units can include a radio transceiver, such as a cellular modem, which can be utilized to communicate with the remote server systems. However, these radio transceivers require a data plan or other cellular service specifically dedicated to the telematics unit. Additionally, many telematics units are only compatible with one service provider (e.g. cellular service provider), thereby requiring different versions of the telematics unit for different geographic regions and limiting the ability of a particular telematics unit to be utilized in all locations in which a particular vehicle may travel.
- In a variety of embodiments, the operational state of a vehicle is utilized to determine if a vehicle telematics device should transmit and/or receive data. In a number of embodiments, vehicle ignition state (i.e. the operational status of the vehicle) is ascertained by monitoring the vehicle for signs indicative of the vehicle ignition state without directly connecting to the vehicle ignition line. Information indicative of vehicle ignition state (i.e. vehicle status data) can be ascertained by observing characteristics of the vehicle including but not limited to the power supplied by the vehicle, vehicle vibration, communications on an OBD II port (e.g., on-board diagnostics connector) or other vehicle data bus line, and/or vehicle position information. In many embodiments, multiple different types of information are combined to ascertain the vehicle ignition state. Systems and methods for using an asset tracking device added to the vehicle after the manufacture of the vehicle without a direct connection to the vehicle ignition line that can be utilized to determine ignition state information in accordance with embodiments are described in U.S. Pat. No. 8,489,271, titled “Systems and Methods for Virtual Ignition Detection” and issued Jul. 16, 2013, the disclosure of which is hereby incorporated by reference in its entirety.
- Systems and methods for radio access interfaces in accordance with embodiments are further described in more detail herein.
- Vehicle telematics systems in accordance with embodiments can transmit a variety of data between a remote server system and a vehicle telematics device using a mobile communications device. A conceptual diagram of a
vehicle telematics system 100 in accordance with an embodiment is shown inFIG. 1 . Thevehicle telematics system 100 includes one or more vehicle telematics devices (110, 110′, etc.). Thevehicle telematics device 110 can communicate with amobile communications device 116, a vehicle data bus 112, and/or an input/output (I/O)interface 114 as appropriate to the requirements of specific applications of embodiments. - In a variety of embodiments, the
mobile communications device 116 and/or thevehicle telematics device 110 communicates with theremote server system 130 via anetwork 120. Thevehicle telematics device 110′ may include themobile communications device 116 to communicate to theremote server system 130 over thenetwork 120. Otherwise, thevehicle telematics device 110 can be coupled in communication with themobile communications device 116 in order for thevehicle telematics device 110 to communicate with theremote server system 130 over thenetwork 120. - In a variety of embodiments, the
network 120 is the Internet. In many embodiments, thenetwork 120 is any wired or wireless network, such as a cellular network, between thevehicle telematics device 110′ and/or themobile communications device 116 and theremote server system 130. In a number of embodiments, theremote server system 130 is implemented using a single server system. In several embodiments, theremote server system 130 is implemented using multiple server systems. - In a variety of embodiments, the
vehicle telematics device 110 is installed in a vehicle having a vehicle data bus 112. In several embodiments, thevehicle telematics device 110 is connected to a vehicle diagnostic connector that provides access to the vehicle data bus 112. Thevehicle telematics device 110 can obtain data from any of a variety of vehicle devices connected to the vehicle data bus 112 utilizing any of a variety of techniques as appropriate to the requirements of specific applications of embodiments. Vehicle devices can include, but are not limited to, engine sensors, electronic control unit (ECU) devices, alternator sensors, vibration sensors, voltage sensors, oxygen sensors, Global Positioning System (GPS) receivers, ignition devices, weight sensors, wireless network devices, and/or acceleration determination devices. Systems and methods for connecting to a vehicle data bus that can be utilized in accordance with embodiments are described in SAE J1978, titled “OBD II Scan Tool,” first published by SAE International of Troy, Mich. on Mar. 1, 1992 and last updated Apr. 30, 2002. Systems and methods for obtaining data from devices connected to a vehicle data bus are described in SAE J1979, titled “E/E Diagnostic Test Modes,” first published by SAE International on Dec. 1, 1991 and last updated Aug. 11, 2014. The disclosures of SAE J1978 and SAE J1979 are hereby incorporated by reference in their entirety. In a number of embodiments, thevehicle telematics device 110 is connected directly, either wired or wirelessly, to one or more sensors within the vehicle and/or does not utilize the vehicle data bus 112. - The
vehicle telematics device 110 can include any of a variety of sensors and/or devices, including those described herein with respect to the vehicle data bus and any described in more detail herein, to obtain data regarding the status of the vehicle. Thevehicle telematics device 110 can also communicate with any of a variety of sensors and/or devices using the I/O interface 114. The I/O interface 114 can be any connection, including wired and wireless connections, as appropriate to the requirements of specific applications of embodiments. In several embodiments, thevehicle telematics device 110 can execute scripts to read data and/or perform particular processes. These scripts can be pre-loaded on the device and/or obtained from theremote server system 130, vehicle data bus 112, and/or the I/O interface 114 as appropriate to the requirements of specific applications of embodiments. Thevehicle telematics device 110 can be self-powered and/or connected into the electrical system of the vehicle in which thevehicle telematics device 110 is installed. In a variety of embodiments, the vehicle telematics device is powered via the vehicle data bus 112 and/or the I/O interface 114. In many embodiments, thevehicle telematics device 110 utilizes a Global Positioning System (GPS) receiver in order to determine the location, speed, and/or acceleration of the vehicle. In several embodiments, thevehicle telematics device 110 obtains location data from themobile communications device 116. However, it should be noted that any location-determining techniques, such as cellular tower triangulation, wireless network geolocation techniques, and dead reckoning techniques, could be utilized as appropriate to the requirements of specific applications of embodiments. - In a variety of embodiments, the
vehicle telematics device 110,mobile communication device 116, and/orremote server system 130 provides a user interface allowing for visualizing and interacting with the data transmitted and/or received between the systems. In several embodiments, thevehicle telematics device 110,mobile communications device 116, and/orremote server system 130 provides an interface, such as an application programming interface (API) or web service that provides some or all of the data to third-party systems for further processing. Access to the interface can be open and/or secured using any of a variety of techniques, such as by using client authorization keys, as appropriate to the requirements of specific applications. - Although a specific architecture of a vehicle telematics system in accordance with embodiments are discussed with reference to
FIG. 1 , a variety of architectures, including sensors and other devices and techniques not specifically described herein, can be utilized in accordance with embodiments. Furthermore, the processes described herein can be performed using any combination the vehicle telematics device, mobile communications device, and/or the remote server systems as appropriate to the requirements of specific applications of embodiments. - Vehicle telematics devices in accordance with embodiments can transmit and receive data via a mobile communications device. A conceptual illustration of a vehicle telematics device in accordance with an embodiment is shown in
FIG. 2A . Thevehicle telematics device 110 includes aprocessor 210 and asecurity chip 215 in communication withmemory 230. Thevehicle telematics device 110 can also include one ormore communication interfaces 220 capable of sending and receiving data. In a number of embodiments, thecommunication interface 220 is in communication with theprocessor 210, thesecurity chip 215, thememory 230, and/or the sensor device(s) 240. In several embodiments, thememory 230 is any form of storage configured to store a variety of data, including, but not limited to, avehicle telematics application 232,sensor data 234, andtelematics data 236. In many embodiments, thevehicle telematics application 232,sensor data 234, and/ortelematics data 236 are stored using an external server system and received by thevehicle telematics device 110 using thecommunications interface 220. -
Sensor devices 240 can include RPM sensors, voltage sensors, GPS receivers, noise sensors, vibration sensors, acceleration sensors, weight sensors, and any other device capable of measuring data regarding a vehicle as appropriate to the requirements of specific applications of embodiments.Sensor devices 240 can be included within thevehicle telematics device 110 and/or located external to thevehicle telematics device 110. Thevehicle telematics device 110 can communicate with external sensor devices using thecommunications interface 220, such as via a vehicle data bus, I/O interface (including serial interfaces),mobile communications device 116, and/or a network connection as appropriate to the requirements of specific applications of embodiments. In a variety of embodiments, thevehicle telematics device 110 is connected to a diagnostic connector (e.g., an OBD II port) in a vehicle. Thevehicle telematics device 110 can also communicate with theremote server system 130 through thecommunications interface 220 and amobile communications device 116 over thenetwork 120. -
FIG. 2B is a conceptual illustration of thevehicle telematics device 110′ in accordance with an embodiment. Thevehicle telematics device 110′ includes themobile communications device 116 coupled to thecommunications interface 220 to communicate with theremote server system 130 over thenetwork 120. - The
vehicle telematics application 232 can direct theprocessor 210 and/or thesecurity chip 215 to perform a variety of secure communication processes, a number of which that can be performed in accordance with embodiments further described herein. - Although specific architectures for vehicle telematics devices in accordance with embodiments are conceptually illustrated in
FIG. 2A , any of a variety of architectures, including those that store data or applications on disk or some other form of storage and are loaded into memory at runtime, can also be utilized. Additionally, any of the data utilized in the system can be cached and transmitted once a network connection (such as a wireless network connection via the communications interface) becomes available. In a variety of embodiments, a memory includes circuitry such as, but not limited to, memory cells constructed using transistors, that are configured to store instructions. Similarly, a processor can include logic gates formed from transistors (or any other device) that dynamically perform actions based on the instructions stored in the memory. In several embodiments, the instructions are embodied in a configuration of logic gates within the processor to implement and/or perform actions described by the instructions. In this way, the systems and methods described herein can be performed utilizing both general-purpose computing hardware and by single-purpose devices. -
FIG. 3 is achart 300 showingexample threat descriptions 305 and correspondingsecurity risk levels 310.Example threat descriptions 305 having asecurity risk level 310 of “critical” include at least the following: Over-the-Air (OTA) updates that are not encrypted or signed, OTA updates that are initiated without authentication, communications security (COMSEC) having no end-to-end encryption, man-in-the-middle (MITM) attack (especially on Global System for Mobile Communications (GSM)), and a Short Message Service (SMS) interface that is not authenticated (e.g., subject to MITM attacks). -
Example threat descriptions 305 having asecurity risk level 310 of “high” include at least the following: Domain Name System (DNS) spoofing (e.g., communication sent to wrong server) and information disclosure in an Assisted Global Positioning System (A-GPS) component. Thevehicle telematics system 100 may undergo other threats not shown inFIG. 3 . - In the
vehicle telematics system 100 ofFIG. 1 , a primary security threat is remote access by an external computing device. For example, an external computing device might attack thevehicle telematic system 100 according to one of thethreat descriptions 305 listed inFIG. 3 . There are at least three levels of security protection to address a primary threat: existing security (e.g., readily available or base level security), Level-1 security (e.g., enhanced access protection), and level-2 security (e.g., full Transport Layer Security (TLS)). A secondary (non-primary) threat is physical access to thevehicle telematics system 100. -
FIG. 4 is a conceptual block diagram of avehicle telematics system 400 having existing security (e.g., base level security). Thevehicle telematics device 110 can communicate with amaintenance server 434, acustomer server 432, and/or themobile communications device 116. The communication by thevehicle telematics device 110 with servers or other devices can be performed with various protocols, such as transmission control protocol (TCP)/internet protocol (IP) and/or user datagram protocol (UDP)/internet protocol (IP) for example. - The
vehicle telematics device 110 sends inbound encrypted data to acustomer server 432. The inbound encryption provides intercept protection (e.g., protection from an interception attack) on data generated by thevehicle telematics device 110. Thevehicle telematics device 110 and/or thecustomer server 432 stores a cryptographic key (e.g., public encryption key and/or private decryption key) as a configuration parameter. - The
customer server 432 sends password authentication to access thevehicle telematics device 110. The password authentication provides remote access protection (e.g., protection from a remote access attack). Thevehicle telematics device 110 and/or thecustomer server 432 stores password authentication as a configuration parameter. - The
mobile communications device 116 sends an SMS password to the vehicle telematics device. The SMS password provides remote access protection (e.g., protection from a remote access attack). Thevehicle telematics device 110 and/or themobile communications device 116 stores SMS password authentication as a configuration parameter. - The vehicle telematics device can receive an attention (AT) command password from a local device (e.g., local terminal program). The AT command password provides local access protection (e.g., protection from a malicious user). The AT command password is typically the same password as the SMS password.
-
FIG. 5 is a conceptual block diagram of avehicle telematics system 500 having Level-1 security (e.g., enhanced access protection). Thevehicle telematics device 110 can communicate with themaintenance server 434, thecustomer server 432, and/or themobile communications device 116. - The
vehicle telematics device 110 can send an encrypted inbound message to acustomer server 432. The encryption provides intercept protection (e.g., protection from an interception attack) on data generated by thevehicle telematics device 110. Thevehicle telematics device 110 and/or thecustomer server 432 stores cryptographic keys and settings as configuration parameters. To the portions of an inbound message, thevehicle telematics device 110 can apply the encryption to the payload and vehicle identification number (VIN) in an option header. A cryptographic key is based on a proprietary stream cipher. Thevehicle telematics device 110 typically does not apply encryption to the maintenance server interface. - The
customer server 432 can send authenticated outbound messages to one or morevehicle telematics devices 110. The outbound authentication protects authenticity and integrity of messages that thecustomer server 432 sends to thevehicle telematics devices 110. To authenticate an outbound message, the sender (e.g., customer server 432) calculates a digital signature of the message combined with a secret key. The authentication code or signature is calculated by using the entire message (e.g., options, header, payload, etc.). To authenticate outgoing messages, thecustomer server 432 can use, for example, keyed-hash message authentication code Merkle-Damgård hash function 5 (HMAC-MD5), 16-byte digest. The secret authentication keys used in the message authentication are unique to eachvehicle telematics device 110 and each interface (e.g., inbound interface, maintenance interface at thevehicle telematics device 110, etc.). The sender (e.g., customer server 432) sends the signature along with the message. The receiver (e.g., vehicle telematics device 110) of the message authenticates the message by verifying the digital signature that is sent with the message matches a signature that the receiver calculates by using the received message combined with the secret key. - The
maintenance server 434 and/or thecustomer support server 432 can authenticate files transmitted to one or morevehicle telematics devices 110. The file authentication provides file tampering protection by validating authenticity and integrity of files using a digital signature of the file transmitted along with the file. Themaintenance server 434 and/or thecustomer support server 432 applies file authentication to all files transmitted to thevehicle telematics device 110. Themaintenance server 434 and/or thecustomer support server 432 supports the file authentication protocol. To authenticate files, themaintenance server 434 can use, for example, an RSA Security/Secure Hash Algorithm two hundred and fifty-six (RSA/SHA-256) digital signature algorithm. The cryptographic keys used by thevehicle telematics device 110 to validate the digital signature of the file can be embedded in the software code of thevehicle telematics device 110. - The
mobile communications device 116 can authenticate SMS messages for transmission to thevehicle telematics device 110. The SMS authentication provides remote access protection (e.g., protection from a remote access attack). Themobile communications device 116 and thevehicle telematics device 110 can handle the SMS authentication. In one embodiment, SMS authentication is substantially the same as message authentication (e.g., HMAC-MD5), which is discussed with reference toFIGS. 4 and 5 . Accordingly, the SMS authentication includes use of a cryptographic key that is similar to a cryptographic key used in message authentication. SMS authentication can complicate SMS access at themobile communications device 116 and/or thevehicle telematics device 110. Accordingly, a software application to handle SMS authentication may be required to be loaded onto themobile communications device 116 and onto thevehicle telematics device 110. - The
customer server 432 can generate authentication keys from a seed (e.g., some non-secret value) and an electronic serial number (ESN) of thevehicle telematics device 110. For example, thecustomer server 432 can provide and manage a seed and an authentication key for each for eachvehicle telematics device 110. Eachvehicle telematics device 110 can generate a seed and an authentication key for each interface at thevehicle telematics device 110. - In one embodiment, protection can be enabled remotely but cannot be disabled remotely. For example, the
mobile communications device 116, thecustomer server 432, and/or themaintenance server 434 can remotely enable protected communication with thevehicle telematics device 110. However, neither themobile communications device 116, thecustomer server 432, nor themaintenance server 434 can remotely disable protected communication with thevehicle telematics device 110. -
FIG. 6 is a conceptual block diagram of avehicle telematics system 600 having level-2 security (e.g., full TLS). Thevehicle telematics device 110 can communicate with themaintenance server 434, thecustomer server 432, and/or themobile communications device 116. - The
customer server 432 and/or themaintenance server 434 can communicate (e.g., transmit data) with thevehicle telematics device 110 via transmission control protocol (TCP)/transport layer security (TLS) session security. For example, the devices of thevehicle telematics system 600 can support TLS for TCP and hypertext transfer protocol (HTTP). The devices of thevehicle telematics system 600 do not have user datagram protocol (UDP) support. The TCP/TLS session security provides protection via authentication and encryption. Thevehicle telematics system 600 applies the TCP/TLS session security to all internet protocol (IP) interfaces (e.g., inbound interface, maintenance interface, etc.). The TCP/TLS session security uses public-key cryptography with public key infrastructure (PKI) certificates. - Like Level-1 security of
FIG. 4 , themaintenance server 434 and/or thecustomer support server 432 inFIG. 5 can also authenticate files transmitted to one or morevehicle telematics devices 110. The file authentication provides file tampering protection by validating authenticity and integrity of files using a digital signature of the file transmitted along with the file. Themaintenance server 434 and/or thecustomer support server 432 applies file authentication to all files transmitted to thevehicle telematics device 110. Themaintenance server 434 and/or thecustomer support server 432 supports the file authentication protocol. To authenticate files, themaintenance server 434 can use a digital signature algorithm, for example, an RSA Security/Secure Hash Algorithm two hundred and fifty-six (RSA/SHA-256) digital signature algorithm. The cryptographic keys used by thevehicle telematics device 110 to validate the digital signature of the file can be embedded in the software code of thevehicle telematics device 110. - Like Level-1 security of
FIG. 4 , themobile communications device 116 inFIG. 5 can also authenticate SMS messages for transmission to thevehicle telematics device 110. The SMS authentication provides remote access protection (e.g., protection from a remote access attack). In one embodiment, SMS authentication is substantially the same as message authentication (e.g., HMAC-MD5), which is discussed with reference toFIGS. 4 and 5 . -
FIG. 7 is a tree diagram showing a public key infrastructure (PKI) 700 for thevehicle telematics system 600, which has level-2 security. ThePKI 700 shows how thevehicle telematics system 600 ofFIG. 6 manages security certificates. A certificate authority or certification authority (CA) is a third-party computing device that issues digital certificates. A digital certificate certifies the ownership of a public encryption key by the named subject of the certificate. This allows other parties to rely upon signatures or on assertions made about the private decryption key that corresponds to the certified public encryption key. A certificate authority acts as a trusted third party that is trusted both by the subject (owner) of the certificate and by the party relying upon the certificate. - A
main certificate authority 705 signs end-point certificate authority certificates for thevehicle telematics system 600, including one or moremobile telematics devices 110, themaintenance server 434, thecustomer server 432, and another customer server 715. Themain certificate authority 705 signs acustomer certificate authority 710 for the customer server 715. Computing devices in thetelematics system 600 exchange certificate authority certificates during TLS session negotiations. Computing devices in thetelematics system 600 can install device certificates and/or certificate authority certificates by using, for example, authenticate-then-encrypt (AtE). -
FIG. 8 is a conceptual block diagram of asystem 800 for provisioning avehicle telematics system 600 having level-2 security. The system includes, without limitation, automatic test equipment (ATE) 805, avehicle telematics device 110, and amain certificate authority 705. Thesystem 800 typically performs provisioning in, for example, a factory and offline from thevehicle telematics system 600. - The
vehicle telematics device 110 uses thesecurity chip 215 to generate a public-private cryptographic key pair. Thevehicle telematics device 110 can securely store the private cryptographic key. Thevehicle telematics device 110 combines a customer identity provided by the ATE 805 with the public cryptographic key to generate a certificate signing request (CSR) for thevehicle telematics device 110. The customer identity is optional security that ensures thevehicle telematics device 110 will only connect with the correct customer server 715. The ATE 805 passes the CSR to themain certificate authority 705. Themain certificate authority 705 signs the authentication certificate. Onto thevehicle telematics device 110, thesystem 800 loads (1) the signed authentication certificate for thetelematics device 110 and (2) a copy of the certificate authority's own certificate or certificates signed by themain certificate authority 705. Thevehicle telematics device 110 securely stores the signed authentication certificates in thesecurity chip 215. -
FIG. 9 is achart 900 showingexample mitigation techniques 905 forvarious threat descriptions 305 and correspondingsecurity risk levels 310. Thethreat descriptions 305 and correspondingsecurity risk levels 310 are discussed with reference toFIG. 3 . Thevehicle telematics system 100 may undergo other threats not shown inFIG. 9 . To mitigate Over-the-Air (OTA) updates that are not encrypted or signed, thevehicle telematics system 100 may include file authentication (e.g., level-1 security and level-2 security). To mitigate OTA updates that are initiated without authentication, thevehicle telematics system 100 may include direct message authentication (e.g., level-1 security and level-2 security). To mitigate communications security (COMSEC) having no end-to-end encryption, thevehicle telematics system 100 may encrypt data at the vehicle telematics device 110 (e.g., base level security and level-1 security). Thevehicle telematics system 100 may alternatively encrypt data at all end points, including thevehicle telematics device 110, thecustomer server 432, and the maintenance server 434 (e.g., level-2 security). To mitigate man-in-the-middle (MITM) attack (especially on Global System for Mobile Communications (GSM)), thevehicle telematics system 100 may include direct message authentication, file authentication, message encryption, and file encryption (e.g., level-1 security and level-2 security). To mitigate Short Message Service (SMS) interface that is not authenticated (e.g., subject to MITM attacks), thevehicle telematics system 100 may SMS authentication (e.g., level-1 security and level-2 security). To mitigate Domain Name System (DNS) spoofing (e.g., communication sent to wrong server), thevehicle telematics system 100 may include server authentication (e.g., level-2 security). To mitigate information disclosure in an Assisted Global Positioning System (A-GPS) component, thevehicle telematics system 100 may randomize the GPS position in an AGPS request associated with thevehicle telematics device 110. - Level-2 TLS requires some important implementation considerations. Operations of a TLS stack require additional and sufficient memory resources (e.g., 30 kilobytes of RAM, 100 kilobytes of flash memory). A security stack is a group of software/firmware programs that work in tandem to produce a result or achieve a common goal (e.g., a goal of configuring a processor to carry out security operations). Sufficient memory for a TLS stack is unavailable in typical commercial products (e.g., typical vehicle telematics devices).
- In one embodiment, a vehicle telematics device requires the addition of hardware, such as
security chip 215 ofFIG. 2A . Thesecurity chip 215 may be included on an add-on security processor board and is enabled to support a security stack (e.g., TLS stack). Alternatively, a security stack can be integrated into theprocessor 210. - In one embodiment, the
processor 210 is upgraded to have more RAM and more hardware cryptography support. One convenient solution is for theprocessor 210 to be a drop-in replacement for a processor that may presently be on a vehicle telematics device. With sufficient modification to theprocessor 210, there may not be a need for theseparate security chip 215. - In one embodiment, the
vehicle telematics device 110 can use a cellular radio Secure Socket interface (e.g., HTTPS). This embodiment is dependent on which cellular radios and which radio firmware (e.g., which type of mobile communications device 116) are deployed in thevehicle telematics device 110. This embodiment is limited to cellular-only solutions without a dial-up network (DUN) (e.g., mobile data terminal (MDT) interface). - In one embodiment, the
hardware security chip 215 supports cryptographic key generation. Accordingly, private encryption key insertion into thevehicle telematics device 110 is not required to take place offline at the factory (e.g., not required to take place online while thevehicle telematic system 100 is active). Thesecurity chip 215 can support secure storage of cryptographic keys and authentication certificates. - In one embodiment, the
vehicle telematics device 110 includes hardware to support Bluetooth Low Energy (BLE) radio. Bluetooth communication capability enables thetelematics device 110 to communicate with other devices (e.g., mobile communications device 116) via the Bluetooth wireless technology standard. - In one embodiment, the
vehicle telematics device 110 includes level-3 physical security to protect against physical attacks. For example, thevehicle telematics device 110 may include at least one of the following: read-out protection, secure boot for authentication of a run-time image, adding authentication to the attention command (ATCmd) interface, and/or encrypting data stored on an external memory device (e.g., flash memory coupled to the serial peripheral interface (SPI) bus). - Although the embodiments have been described in certain specific aspects, many additional modifications and variations would be apparent to those skilled in the art. In particular, any of the various processes described herein can be performed in alternative sequences and/or in parallel (on the same or on different computing devices) in order to achieve similar results in a manner that is more appropriate to the requirements of a specific application. It is therefore to be understood that the embodiments can be practiced otherwise than specifically described without departing from the scope and spirit. Thus, the embodiments should be considered in all respects as illustrative and not restrictive. It will be evident to the person skilled in the art to freely combine several or all of the embodiments discussed here as deemed suitable for a specific application. Throughout this disclosure, terms like “advantageous”, “exemplary” or “preferred” indicate elements or dimensions that are particularly suitable (but not essential) to an embodiment, and that may be modified wherever deemed suitable by the skilled person, except where expressly required.
- While certain exemplary embodiments have been described and shown in the accompanying drawings, it is to be understood that such embodiments are merely illustrative of and not restrictive on the broad disclosure, and that the embodiments not be limited to the specific constructions and arrangements shown and described, since various other modifications may occur to those ordinarily skilled in the art.
- When implemented in software, the elements of the embodiments are essentially the code segments to perform the necessary tasks. The program or code segments can be stored in a processor readable medium or transmitted by a computer data signal embodied in a carrier wave over a transmission medium or communication link. The “processor readable medium” may include any medium that can store or transfer information. Examples of the processor readable medium include an electronic circuit, a semiconductor memory device, a read only memory (ROM), a flash memory, an erasable programmable read only memory (EPROM), a floppy diskette, a CD-ROM, an optical disk, a hard disk, a fiber optic medium, a radio frequency (RF) link, etc. The computer data signal may include any signal that can propagate over a transmission medium such as electronic network channels, optical fibers, air, electromagnetic, RF links, etc. The code segments may be downloaded via computer networks such as the Internet, Intranet, etc.
- While this specification includes many specifics, these should not be construed as limitations on the scope of the disclosure or of what may be claimed, but rather as descriptions of features specific to particular implementations of the disclosure. Certain features that are described in this specification in the context of separate implementations may also be implemented in combination in a single implementation. Conversely, various features that are described in the context of a single implementation may also be implemented in multiple implementations, separately or in sub-combination. Moreover, although features may be described herein as acting in certain combinations and even initially claimed as such, one or more features from a claimed combination may in some cases be excised from the combination, and the claimed combination may be directed to a sub-combination or variations of a sub-combination. While embodiments have been particularly described, they should not be construed as limited by such embodiments, but rather construed according to the claims included herein.
Claims (20)
1. A vehicle telematics device, comprising:
a processor;
a memory coupled to the processor and storing a vehicle telematics application; and
a security chip coupled to the processor and the memory, wherein the security chip is configured to support a Transport Layer Security (TLS) stack.
2. The vehicle telematics device of claim 1 , wherein:
the memory is sufficient to handle operations of the Transport Layer Security (TLS) stack.
3. The vehicle telematics device of claim 2 , wherein:
the memory includes at least 30 kilobytes of random access memory (RAM) and 100 kilobytes of flash memory.
4. The vehicle telematics device of claim 1 , wherein:
the security chip can generate and securely store a cryptographic key.
5. The vehicle telematics device of claim 1 , further comprising:
a communications interface coupled to the processor and to a data bus of a vehicle.
6. The vehicle telematics device of claim 5 , further comprising:
one or more sensor devices coupled to the data bus, capable of measuring sensor data regarding the vehicle, and configured to store the sensor data in the memory.
7. The vehicle telematics device of claim 1 , wherein:
the vehicle telematics device can communicate with a customer server; and
the security chip can transmit encrypted data to the customer server via a Transmission Control Protocol (TCP)/Transport Layer Security (TLS) security session.
8. The vehicle telematics device of claim 1 , wherein:
the vehicle telematics device can communicate with a mobile communications device; and
the security chip can apply Short Message Service (SMS) authentication via challenge-response authentication with the mobile communications device.
9. The vehicle telematics device of claim 1 , wherein:
the vehicle telematics device can communicate with a maintenance server; and
the security chip can transmit encrypted data to the maintenance server via a Transmission Control Protocol (TCP)/Transport Layer Security (TLS) security session.
10. The vehicle telematics device of claim 1 , wherein:
the vehicle telematics device can communicate with a certificate authority; and
the security chip is configured to receive a signed certificate authority certificate authority certificate from the certificate authority.
11. A vehicle telematics system, comprising:
a vehicle telematics device, including
a processor,
a memory coupled to the processor and storing a vehicle telematics application, and
a security chip coupled to the processor and the memory, wherein the security chip is configured to support a Transport Layer Security (TLS) stack.
12. The vehicle telematics system of claim 11 , wherein:
the memory is sufficient to handle operations of the Transport Layer Security (TLS) stack.
13. The vehicle telematics system of claim 12 , wherein:
the memory includes at least 30 kilobytes of random access memory (RAM) and 100 kilobytes of flash memory.
14. The vehicle telematics system of claim 11 , wherein:
the security chip can generate and securely store a cryptographic key.
15. The vehicle telematics system of claim 11 , wherein:
the vehicle telematics device further includes a communications interface coupled to the processor and to a data bus of a vehicle.
16. The vehicle telematics system of claim 15 , wherein:
the vehicle telematics device further includes one or more sensor devices coupled to the data bus, capable of measuring sensor data regarding the vehicle, and configured to store the sensor data in the memory.
17. The vehicle telematics system of claim 11 , further comprising:
a customer server in communication with the vehicle telematics device, wherein the security chip can transmit encrypted data to the customer server via a Transmission Control Protocol (TCP)/Transport Layer Security (TLS) security session.
18. The vehicle telematics system of claim 11 , further comprising:
a mobile communications device in communication with the vehicle telematics device, wherein the security chip can apply Short Message Service (SMS) authentication via challenge-response authentication with the mobile communications device.
19. The vehicle telematics system of claim 11 , further comprising:
a maintenance server in communication with the vehicle telematics device, wherein the security chip can transmit encrypted data to the maintenance server via a Transmission Control Protocol (TCP)/Transport Layer Security (TLS) security session.
20. The vehicle telematics system of claim 11 , further comprising:
a certificate authority in communication with the vehicle telematics device, wherein the security chip is configured to receive a signed certificate authority certificate authority certificate from the certificate authority.
Priority Applications (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US15/945,730 US20180302228A1 (en) | 2017-04-04 | 2018-04-04 | Systems and methods for secure communications in vehicle telematics systems |
US15/931,034 US11381402B2 (en) | 2017-04-04 | 2020-05-13 | Systems and methods for secure communications in vehicle telematics systems |
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US201762481437P | 2017-04-04 | 2017-04-04 | |
US15/945,730 US20180302228A1 (en) | 2017-04-04 | 2018-04-04 | Systems and methods for secure communications in vehicle telematics systems |
Related Child Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US15/931,034 Continuation US11381402B2 (en) | 2017-04-04 | 2020-05-13 | Systems and methods for secure communications in vehicle telematics systems |
Publications (1)
Publication Number | Publication Date |
---|---|
US20180302228A1 true US20180302228A1 (en) | 2018-10-18 |
Family
ID=63791003
Family Applications (2)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US15/945,730 Abandoned US20180302228A1 (en) | 2017-04-04 | 2018-04-04 | Systems and methods for secure communications in vehicle telematics systems |
US15/931,034 Active US11381402B2 (en) | 2017-04-04 | 2020-05-13 | Systems and methods for secure communications in vehicle telematics systems |
Family Applications After (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US15/931,034 Active US11381402B2 (en) | 2017-04-04 | 2020-05-13 | Systems and methods for secure communications in vehicle telematics systems |
Country Status (1)
Country | Link |
---|---|
US (2) | US20180302228A1 (en) |
Cited By (13)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20190007212A1 (en) * | 2017-06-30 | 2019-01-03 | Intel Corporation | Secure unlock systems for locked devices |
US20200266990A1 (en) * | 2019-02-20 | 2020-08-20 | Spireon, Inc. | Communicating with a vehicle tracking device via short message service (sms) secured by single-use credentials |
US20210211442A1 (en) * | 2018-10-17 | 2021-07-08 | Panasonic Intellectual Property Corporation Of America | Threat analysis apparatus, threat analysis method, and recording medium |
WO2021150209A1 (en) | 2020-01-21 | 2021-07-29 | Calamp Corp. | Systems and methods for switching between communication and navigation modes in a telematics device |
US11258772B2 (en) * | 2018-06-19 | 2022-02-22 | Cypress Semiconductor Corporation | Secured communication from within non-volatile memory device |
US11314893B2 (en) | 2019-08-27 | 2022-04-26 | Toyota Motor Engineering & Manufacturing North America, Inc. | Systems and methods for securing personally identifiable information within telematics data |
EP4092957A1 (en) * | 2021-05-19 | 2022-11-23 | Volvo Car Corporation | Secure and trusted peer-to-peer offline communication systems and methods |
CN115696318A (en) * | 2023-01-05 | 2023-02-03 | 中国电子科技集团公司第三十研究所 | Secure communication device, secure authentication method, and secure communication method |
US11631284B2 (en) | 2020-01-21 | 2023-04-18 | Calamp Corp. | Systems and methods for switching between communication and navigation modes in a telematics device |
US20230410564A1 (en) * | 2022-05-27 | 2023-12-21 | Calamp Corp. | Technologies for switching between communication modes in a telematics device |
US11956274B1 (en) * | 2021-03-02 | 2024-04-09 | Keysight Technologies, Inc. | System and method for implementing a secure configuration of controllers and instruments in a networked system |
WO2024220903A1 (en) * | 2023-04-21 | 2024-10-24 | Tesla, Inc. | User authorized direct data streaming for vehicle data |
US12270926B2 (en) | 2022-05-27 | 2025-04-08 | Calamp Corp. | Technologies for determining location of a telematics device during communication mode switching |
Families Citing this family (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US11871234B2 (en) * | 2017-09-06 | 2024-01-09 | Transportation Ip Holdings, Llc | Secure vehicle to vehicle PTC communication |
EP3692746B1 (en) * | 2017-10-03 | 2021-10-27 | Volvo Truck Corporation | Method, apparatuses and arrangement for establishing a wireless connection between a vehicle and a vehicle accessory |
CN111385345A (en) * | 2018-12-29 | 2020-07-07 | 北京航迹科技有限公司 | System and method for data transmission and storage |
US20250184723A1 (en) * | 2023-11-30 | 2025-06-05 | Cradlepoint, Inc. | Systems and methods for micro-tunneling with zero overhead, on-demand efficient tunneling for networks |
Citations (16)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20080172306A1 (en) * | 2007-01-16 | 2008-07-17 | Schorr Ronni E | Systems and Methods for Electronic Gifting |
US20090047929A1 (en) * | 2007-08-13 | 2009-02-19 | General Motors Corporation | Method of authenticating a short message service (sms) message |
US20110105082A1 (en) * | 2009-11-04 | 2011-05-05 | Jeff Haley | Exempt from automatic restriction of functionality moving phones accompanied by an override transmitter |
US20110153121A1 (en) * | 2007-11-06 | 2011-06-23 | Minas Minassian | Secured area access system, apparatus, and method |
US20120028607A1 (en) * | 2010-07-30 | 2012-02-02 | General Motors Llc | Mobile-originated sms local broadcast |
US20140096217A1 (en) * | 2012-09-28 | 2014-04-03 | Harman Becker Automotive Systems Gmbh | System for personalized telematic services |
US20140108787A1 (en) * | 2012-10-12 | 2014-04-17 | Renesas Electronics Corporation | In-vehicle communication system |
US20160104123A1 (en) * | 2014-10-10 | 2016-04-14 | At&T Intellectual Property I, L.P. | Predictive Maintenance |
US20160344704A1 (en) * | 2015-05-19 | 2016-11-24 | Robert Bosch Gmbh | Method and decision gateway for authorizing a function of an embedded control unit |
US20160343178A1 (en) * | 2015-03-10 | 2016-11-24 | Itire, Llc | Method for communicating data between an nfc-enabled device on a vehicle and a driver identification device |
US20160344705A1 (en) * | 2015-05-19 | 2016-11-24 | Robert Bosch Gmbh | Method and update gateway for updating an embedded control unit |
US20170142556A1 (en) * | 2013-03-12 | 2017-05-18 | Zendrive, Inc. | System and method for determining a driver in a telematic application |
US20170308075A1 (en) * | 2016-04-26 | 2017-10-26 | Ford Global Technologies, Llc | Determination of continuous user interaction and intent through measurement of force variability |
US20180007038A1 (en) * | 2016-06-29 | 2018-01-04 | International Business Machines Corporation | Monitoring encrypted communication sessions |
US20180061230A1 (en) * | 2016-08-29 | 2018-03-01 | Allstate Insurance Company | Electrical Data Processing System for Monitoring or Affecting Movement of a Vehicle Using a Traffic Device |
US20180114378A1 (en) * | 2016-10-24 | 2018-04-26 | Allstate Insurance Company | Enhanced Vehicle Bad Fuel Sensor With Crowdsourcing Analytics |
Family Cites Families (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US8489271B2 (en) | 2009-10-31 | 2013-07-16 | Calamp Corp. | Systems and methods for virtual ignition detection |
KR102444239B1 (en) * | 2016-01-21 | 2022-09-16 | 삼성전자주식회사 | A security chip, an application processor, a device including the security chip, and an operating method thereof |
US10284654B2 (en) * | 2016-09-27 | 2019-05-07 | Intel Corporation | Trusted vehicle telematics using blockchain data analytics |
-
2018
- 2018-04-04 US US15/945,730 patent/US20180302228A1/en not_active Abandoned
-
2020
- 2020-05-13 US US15/931,034 patent/US11381402B2/en active Active
Patent Citations (16)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20080172306A1 (en) * | 2007-01-16 | 2008-07-17 | Schorr Ronni E | Systems and Methods for Electronic Gifting |
US20090047929A1 (en) * | 2007-08-13 | 2009-02-19 | General Motors Corporation | Method of authenticating a short message service (sms) message |
US20110153121A1 (en) * | 2007-11-06 | 2011-06-23 | Minas Minassian | Secured area access system, apparatus, and method |
US20110105082A1 (en) * | 2009-11-04 | 2011-05-05 | Jeff Haley | Exempt from automatic restriction of functionality moving phones accompanied by an override transmitter |
US20120028607A1 (en) * | 2010-07-30 | 2012-02-02 | General Motors Llc | Mobile-originated sms local broadcast |
US20140096217A1 (en) * | 2012-09-28 | 2014-04-03 | Harman Becker Automotive Systems Gmbh | System for personalized telematic services |
US20140108787A1 (en) * | 2012-10-12 | 2014-04-17 | Renesas Electronics Corporation | In-vehicle communication system |
US20170142556A1 (en) * | 2013-03-12 | 2017-05-18 | Zendrive, Inc. | System and method for determining a driver in a telematic application |
US20160104123A1 (en) * | 2014-10-10 | 2016-04-14 | At&T Intellectual Property I, L.P. | Predictive Maintenance |
US20160343178A1 (en) * | 2015-03-10 | 2016-11-24 | Itire, Llc | Method for communicating data between an nfc-enabled device on a vehicle and a driver identification device |
US20160344704A1 (en) * | 2015-05-19 | 2016-11-24 | Robert Bosch Gmbh | Method and decision gateway for authorizing a function of an embedded control unit |
US20160344705A1 (en) * | 2015-05-19 | 2016-11-24 | Robert Bosch Gmbh | Method and update gateway for updating an embedded control unit |
US20170308075A1 (en) * | 2016-04-26 | 2017-10-26 | Ford Global Technologies, Llc | Determination of continuous user interaction and intent through measurement of force variability |
US20180007038A1 (en) * | 2016-06-29 | 2018-01-04 | International Business Machines Corporation | Monitoring encrypted communication sessions |
US20180061230A1 (en) * | 2016-08-29 | 2018-03-01 | Allstate Insurance Company | Electrical Data Processing System for Monitoring or Affecting Movement of a Vehicle Using a Traffic Device |
US20180114378A1 (en) * | 2016-10-24 | 2018-04-26 | Allstate Insurance Company | Enhanced Vehicle Bad Fuel Sensor With Crowdsourcing Analytics |
Cited By (22)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20190007212A1 (en) * | 2017-06-30 | 2019-01-03 | Intel Corporation | Secure unlock systems for locked devices |
US20240031158A1 (en) * | 2017-06-30 | 2024-01-25 | Intel Corporation | Secure unlock systems for locked devices |
US20200366487A1 (en) * | 2017-06-30 | 2020-11-19 | Intel Corporation | Secure unlock systems for locked devices |
US11664994B2 (en) * | 2017-06-30 | 2023-05-30 | Intel Corporation | Secure unlock systems for locked devices |
US11258772B2 (en) * | 2018-06-19 | 2022-02-22 | Cypress Semiconductor Corporation | Secured communication from within non-volatile memory device |
US12028353B2 (en) * | 2018-10-17 | 2024-07-02 | Panasonic Intellectual Property Corporation Of America | Threat analysis apparatus, threat analysis method, and recording medium |
US20210211442A1 (en) * | 2018-10-17 | 2021-07-08 | Panasonic Intellectual Property Corporation Of America | Threat analysis apparatus, threat analysis method, and recording medium |
US11664993B2 (en) * | 2019-02-20 | 2023-05-30 | Spireon, Inc. | Communicating with a vehicle tracking device via short message service (SMS) secured by single-use credentials |
US20200266990A1 (en) * | 2019-02-20 | 2020-08-20 | Spireon, Inc. | Communicating with a vehicle tracking device via short message service (sms) secured by single-use credentials |
US11314893B2 (en) | 2019-08-27 | 2022-04-26 | Toyota Motor Engineering & Manufacturing North America, Inc. | Systems and methods for securing personally identifiable information within telematics data |
EP4094044A4 (en) * | 2020-01-21 | 2023-11-08 | Calamp Corp. | Systems and methods for switching between communication and navigation modes in a telematics device |
US11631284B2 (en) | 2020-01-21 | 2023-04-18 | Calamp Corp. | Systems and methods for switching between communication and navigation modes in a telematics device |
WO2021150209A1 (en) | 2020-01-21 | 2021-07-29 | Calamp Corp. | Systems and methods for switching between communication and navigation modes in a telematics device |
US11956274B1 (en) * | 2021-03-02 | 2024-04-09 | Keysight Technologies, Inc. | System and method for implementing a secure configuration of controllers and instruments in a networked system |
CN115460562A (en) * | 2021-05-19 | 2022-12-09 | 沃尔沃汽车公司 | Secure and trusted peer-to-peer offline communication system and method |
EP4092957A1 (en) * | 2021-05-19 | 2022-11-23 | Volvo Car Corporation | Secure and trusted peer-to-peer offline communication systems and methods |
US12245034B2 (en) | 2021-05-19 | 2025-03-04 | Volvo Car Corporation | Secure and trusted peer-to-peer offline communication systems and methods |
US20230410564A1 (en) * | 2022-05-27 | 2023-12-21 | Calamp Corp. | Technologies for switching between communication modes in a telematics device |
US12056963B2 (en) * | 2022-05-27 | 2024-08-06 | Calamp Corp. | Technologies for switching between communication modes in a telematics device |
US12270926B2 (en) | 2022-05-27 | 2025-04-08 | Calamp Corp. | Technologies for determining location of a telematics device during communication mode switching |
CN115696318A (en) * | 2023-01-05 | 2023-02-03 | 中国电子科技集团公司第三十研究所 | Secure communication device, secure authentication method, and secure communication method |
WO2024220903A1 (en) * | 2023-04-21 | 2024-10-24 | Tesla, Inc. | User authorized direct data streaming for vehicle data |
Also Published As
Publication number | Publication date |
---|---|
US20210067346A1 (en) | 2021-03-04 |
US11381402B2 (en) | 2022-07-05 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US11381402B2 (en) | Systems and methods for secure communications in vehicle telematics systems | |
US10601787B2 (en) | Root of trust of geolocation | |
CN107659550B (en) | Vehicle-to-vehicle private communication | |
US9201131B2 (en) | Secure routing based on degree of trust | |
EP2127300B1 (en) | Method and apparatus for securing location information and access control using the location information | |
US10080136B2 (en) | Credibility token system for over the air multi-programming of a wireless device and method of operation | |
Biswas et al. | ID-based safety message authentication for security and trust in vehicular networks | |
KR102230407B1 (en) | Secure routing based on the physical locations of routers | |
US20130232565A1 (en) | Secure Routing Based on the Physical Locations of Routers | |
US12113898B2 (en) | Binding with cryptographic key attestation | |
US10931459B2 (en) | Onboard computer system, vehicle, management method, and computer program | |
EP3384629B1 (en) | System and method for tamper-resistant device usage metering | |
KR20160092496A (en) | Communication device, lsi, program, and communication system | |
JP6207528B2 (en) | Secure routing based on reliability | |
CN101815289A (en) | Method for protecting and authenticating data using micro-credentials | |
JP2014520430A (en) | Obtaining geolocation information of network nodes in an attenuation environment for cyber and network security applications | |
CN107040511A (en) | Location-based trust computing node in cloud computing architecture | |
RU2656832C2 (en) | Geothentication based on new network packet structure | |
KR20190033380A (en) | Authenticating a networked camera using a certificate having device binding information | |
Altay et al. | Gps-sec | |
JP6556976B2 (en) | Geocentration based on network ranging | |
Kleberger et al. | Protecting vehicles against unauthorised diagnostics sessions using trusted third parties | |
US20230186692A1 (en) | Device registration and certificate management for autonomous vehicles | |
Brighente et al. | Strangers Sets: Preserving Drones' Location Privacy while Avoiding Violations of Critical Infrastructures | |
JP2025524046A (en) | Methods for authenticating data |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
STPP | Information on status: patent application and granting procedure in general |
Free format text: DOCKETED NEW CASE - READY FOR EXAMINATION |
|
AS | Assignment |
Owner name: CALAMP CORP., CALIFORNIA Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:HERGESHEIMER, PETER;REEL/FRAME:047025/0365 Effective date: 20180904 |
|
STPP | Information on status: patent application and granting procedure in general |
Free format text: NON FINAL ACTION MAILED |
|
STCB | Information on status: application discontinuation |
Free format text: ABANDONED -- FAILURE TO RESPOND TO AN OFFICE ACTION |