Managing A Non-Acknowledgement Message (NACK) Attack

    公开(公告)号:US20240323694A1

    公开(公告)日:2024-09-26

    申请号:US18189242

    申请日:2023-03-24

    CPC classification number: H04W12/122 H04W12/009

    Abstract: Various embodiments include methods and computing devices implementing such methods for detecting and responding to a non-acknowledgment message (NACK) attack. In some embodiments, a device vehicle processing system may perform an operation to determine whether a NACK attacker is present in response to a quantity of NACK messages received within a time interval exceeding a threshold quantity that is based on a vehicle communication environment proximate to the vehicle. The vehicle processing system may perform an operation to mitigate adverse effects of NACK messages received from the NACK attacker in response to determining that the NACK attacker is present.

    TECHNIQUES FOR ACCURATE CABLE LOSS MEASUREMENT

    公开(公告)号:US20230098404A1

    公开(公告)日:2023-03-30

    申请号:US17486745

    申请日:2021-09-27

    Abstract: Certain aspects of the present disclosure provide techniques for determining a cable loss associated with a transmission cable of an apparatus. An example method includes sending, to a radio modem of the apparatus, a request for the radio modem to use a target power when sending one or more signals to the signal compensator device for determining a cable loss associated with a transmission cable communicatively coupling the radio modem with the signal compensator device, receiving, at a signal compensator device of the apparatus, the one or more signals from the radio modem sent using the target power, and determining the cable loss associated with the transmission cable based on the one or more signals.

    USER EQUIPMENT MESSAGING TECHNIQUES AND APPLICATIONS

    公开(公告)号:US20210127292A1

    公开(公告)日:2021-04-29

    申请号:US17078470

    申请日:2020-10-23

    Abstract: A method of controlling a radio-frequency (RF) transaction region comprises: determining a value of a characteristic associated with an ability of roadside equipment, associated with an RF transaction, to obtain information from a user equipment (UE) in the RF transaction region; determining, based on the value of the characteristic, a value of a parameter affecting the ability of the roadside equipment to obtain the information from the UE in the RF transaction region; and conveying the value of the parameter to the UE to affect transmission of messages from the UE to the roadside equipment.

    ROAD USAGE CHARGING (RUC) DETERMINATION AND REPORTING TECHNIQUES

    公开(公告)号:US20240193568A1

    公开(公告)日:2024-06-13

    申请号:US18509158

    申请日:2023-11-14

    CPC classification number: G06Q20/145 G06Q20/3823 G06Q20/3829 G06Q2220/00

    Abstract: Disclosed are systems and techniques for road usage charging. For example, a vehicle (e.g., using a vehicle computing device (VCD)) can receive an encryption key of a first charging entity and determine a first road usage charge associated with the first charging entity based on a first charge policy. The vehicle can determine a total usage charge (based on the first road usage charge) for road usage (e.g., associated with the first charging entity) and can encrypt the total usage charge based on the encryption key. The vehicle can determine information associated with the total usage charge and can encrypt the information associated with the total usage charge based at least in part on the encryption key. The vehicle can transmit the encrypted total usage charge to a first network entity and can transmit the encrypted information to a second network entity for verifying the encrypted total usage charge.

    MESSAGE VERIFICATION OPTIMIZATION

    公开(公告)号:US20220322094A1

    公开(公告)日:2022-10-06

    申请号:US17657106

    申请日:2022-03-29

    Abstract: Apparatus, methods, and computer program products for cache building for cryptographic verification that may be used in connection with a V2X communication system are provided. An example method includes receiving, from a second wireless device, at least one V2X message of a plurality of V2X messages, the at least one V2X message being associated with a verification key. The example method further includes determining whether the verification key for the at least one V2X message is a target verification key. The example method further includes determining, if the verification key is the target verification key, to generate an entry in a cache for the verification key. The example method further includes generating, upon determining to generate the entry in the cache, the entry in the cache for the verification key.

Patent Agency Ranking