Cryptographic hash chain for vehicle configuration verification

    公开(公告)号:US11349669B1

    公开(公告)日:2022-05-31

    申请号:US16026865

    申请日:2018-07-03

    Abstract: In one aspect, a computer system for vehicle configuration verification, and/or detecting unauthorized vehicle modification may be provided. In some exemplary embodiments, the computer system may include a processor and a non-transitory, tangible, computer-readable storage medium having instructions stored thereon that, in response to execution by the processor, cause the processor to perform operations including: (1) receiving a vehicle image, including a vehicle identifier and at least one software module; (2) calculating a configuration hash value of the at least one software module; generating a first data block including the configuration hash value, a first index value, the vehicle identifier, and a digital signature; (3) storing the first data block in a memory; and/or (4) transmitting the first data block to any number of network participants using a distributed network to facilitate vehicle software configuration verification.

    Vehicle configuration verification using cryptographic hash chains

    公开(公告)号:US11088842B1

    公开(公告)日:2021-08-10

    申请号:US16026896

    申请日:2018-07-03

    Abstract: In one aspect, a computer system for verifying vehicle software configuration may be provided. In some exemplary embodiments, the computer system may include a processor and a non-transitory, tangible, computer-readable storage medium having instructions stored thereon that, in response to execution by the processor, cause the processor to: (1) transmit an authentication request to a vehicle computing system including a hash algorithm specification; (2) receive, from the vehicle computing system, a current configuration hash value and a vehicle identifier; (3) retrieve a trusted data block from a memory based upon the vehicle identifier; (4) compare the current configuration hash value to a stored configuration hash value included in the trusted data block; and (5) transmit an authentication response to the vehicle computing system based upon the comparison.

Patent Agency Ranking