-
公开(公告)号:US20230284029A1
公开(公告)日:2023-09-07
申请号:US18088442
申请日:2022-12-23
Applicant: Intel Corporation
Inventor: Liuyang Lily Yang , Manoj R. Sastry , Xiruo Liu , Moreno Ambrosin
CPC classification number: H04W12/122 , G05D1/0088 , G08G1/164 , H04W4/40 , H04W8/005 , H04W48/02 , G05D2201/0213
Abstract: A first roadway system receives a communication from a second roadway system over a wireless channel, where the communication includes a description of a physical object within a driving environment. Characteristics of the physical object are determined based on sensors of the first roadway system. The communication is determined to contain an anomaly based on a comparison of the description of the physical object with the characteristics determined based on the sensors of the first roadway system. Misbehavior data is generated to describe the anomaly. A remedial action is initiated based on the anomaly.
-
12.
公开(公告)号:US20220350888A1
公开(公告)日:2022-11-03
申请号:US17867780
申请日:2022-07-19
Applicant: INTEL CORPORATION
Inventor: Christopher N. Gutierrez , Marcio Juliato , Shabbir Ahmed , Qian Wang , Manoj Sastry , Liuyang L. Yang , Xiruo Liu
IPC: G06F21/56
Abstract: Logic may implement observation layer intrusion detection systems (IDSs) to combine observations by intrusion detectors and/or other intrusion detection systems. Logic may monitor one or more control units at one or more observation layers of an in-vehicle network, each of the one or more control units to perform a vehicle function. Logic may combine observations of the one or more control units at the one or more observation layers. Logic may determine, based on a combination of the observations, that one or more of the observations represent an intrusion. Logic may determine, based at least on the observations, characteristics of an attack, and to pass the characteristics of the attack information to a forensic logging system to log the attack or pass the characteristics of the attack to a recovery system for informed selection of recovery procedures. Logic may dynamically adjust a threshold for detection of suspicious activity.
-
公开(公告)号:US11463262B2
公开(公告)日:2022-10-04
申请号:US16720956
申请日:2019-12-19
Applicant: Intel Corporation
Inventor: Marcio Juliato , Shabbir Ahmed , Christopher Gutierrez , Xiruo Liu , Manoj Sastry , Liuyang Yang
Abstract: Various embodiments are generally directed to providing authentication and confidentiality mechanisms for message communication over an in-vehicle network. For example, authentication data associated with a communicating node may be transmitted over the network by encoding different predefined voltage levels on top of the message bits of the message being communicated. Different voltage levels may represent different encodings, such as a bit-pair or any bit combination of the authentication data. In a further example, messaging confidentiality between at least two communicating nodes may be achieved by pseudo-randomly flipping, or scrambling, the dominant and recessive voltages of the entire message frame at the analog level based on a pseudo-random control bit sequence.
-
公开(公告)号:US11024180B2
公开(公告)日:2021-06-01
申请号:US16234495
申请日:2018-12-27
Applicant: Intel Corporation
Inventor: Liuyang Yang , Yair Yona , Moreno Ambrosin , Xiruo Liu , Hosein Nikopour , Shilpa Talwar , Kathiravetpillai Sivanesan , Sridhar Sharma , Debabani Choudhury , Kuilin Clark Chen , Jeffrey Ota , Justin Gottschlich
Abstract: Methods, apparatus, systems and articles of manufacture are disclosed to validate data communicated by a vehicle. An example apparatus an anomaly detector to, in response to data communicated by a vehicle, at least one of compare an estimated speed with a reported speed or compare a location of the vehicle with a reported location. The apparatus including the anomaly detector further to generate an indication of the vehicle in response to the comparison. The apparatus further includes a notifier to discard data sent by the vehicle and notify surrounding vehicles of the data communicated by the vehicle.
-
公开(公告)号:US10516654B2
公开(公告)日:2019-12-24
申请号:US15070166
申请日:2016-03-15
Applicant: Intel Corporation
Inventor: Meiyuan Zhao , Jesse Walker , Xiruo Liu , Steffen Schulz , Jianqing Zhang
Abstract: In one embodiment, a computing device includes at least one hardware processor to execute instructions, a network interface to enable communication with a second computing device and a third computing device, and at least one storage medium. Such medium may store instructions that when executed by the computing device enable the computing device to request delegation of a key provisioning privilege for the second computing device from the third computing device via a parent-guardian delegation protocol comprising a three-party key distribution protocol with the second computing device and the third computing device, the three-party key distribution protocol having interposed therein a two-party authenticated key exchange protocol between the computing device and the third computing device. Other embodiments are described and claimed.
-
公开(公告)号:US20190327096A1
公开(公告)日:2019-10-24
申请号:US16456058
申请日:2019-06-28
Applicant: Intel Corporation
Inventor: Xiruo Liu , Rafael Misoczki , Manoj R. Sastry , Santosh Ghosh , Li Zhao
Abstract: An attestation protocol between a prover device (P), a verifier device (V), and a trusted third-party device (TPP). P and TPP have a first trust relationship represented by a first cryptographic representation based on a one-or-few-times, hash-based, signature key. V sends an attestation request to P, with the attestation request including a second cryptographic representation of a second trust relationship between V and TPP. In response to the attestation request, P sends a validation request to TPP, with the validation request being based on a cryptographic association of the first trust relationship and the second trust relationship. TPP provides a validation response including a cryptographic representation of verification of validity of the first trust relationship and the second trust relationship. P sends an attestation response to V based on the validation response.
-
公开(公告)号:US11792191B2
公开(公告)日:2023-10-17
申请号:US17650767
申请日:2022-02-11
Applicant: Intel Corporation
Inventor: Xiruo Liu , Rafael Misoczki , Santosh Ghosh , Manoj Sastry
CPC classification number: H04L63/0869 , H04L9/0852 , H04L9/3242 , H04L9/3265
Abstract: In one example a prover device comprises one or more processors, a computer-readable memory, and signature logic to store a first cryptographic representation of a first trust relationship between the prover device and a verifier device, the first cryptographic representation based on a pair of asymmetric hash-based multi-time signature keys, receive an attestation request message from the verifier device, the attestation request message comprising attestation data for the verifier device and a hash-based signature generated by the verifier device, and in response to the attestation request message, to verify the attestation data, verify the hash-based signature generated by the verifier device using a public key associated with the verifier device, generate an attestation reply message using a hash-based multi-time private signature key and send the attestation reply message to the verifier device. Other examples may be described.
-
18.
公开(公告)号:US11665178B2
公开(公告)日:2023-05-30
申请号:US16727638
申请日:2019-12-26
Applicant: Intel Corporation
Inventor: Christopher N. Gutierrez , Shabbir Ahmed , Marcio Juliato , Manoj Sastry , Liuyang L. Yang , Xiruo Liu
CPC classification number: H04L63/1408 , G06N20/20 , H04L12/40032 , H04L63/0227 , H04L63/1425 , H04L63/1441 , H04L2012/40273
Abstract: Logic may reduce the latency and increase the confidence in message time series (MTS) intrusion detection systems (IDSs). Logic may capture traffic on an in-vehicle network bus during a first traffic window. Logic may filter the traffic within the first traffic window to determine more than one observation window, wherein the more than observation window comprises at least a first observation window and a second observation window. Logic may evaluate the more than one observation window to determine a first output based on a first observation window and a second output based on a second observation window, the first and second outputs to indicate if an intrusion is detected. Logic may determine, based on a combination of the outputs, that the traffic during the first traffic window comprises an intrusion. Logic may output an indication of the intrusion.
-
公开(公告)号:US20220355807A1
公开(公告)日:2022-11-10
申请号:US17858676
申请日:2022-07-06
Applicant: Intel Corporation
Inventor: Xiruo Liu , Liuyang Yang , Manoj Sastry , Marcio Juliato , Shabbir Ahmed , Christopher Gutierrez
Abstract: Systems, apparatus, methods, and techniques for an ego vehicle to respond to detecting misbehaving information from remote vehicles are provided. An ego vehicle, in addition to reporting misbehaving vehicles to a misbehavior authority via a vehicle-to-anything communication network, can, take additional actions based in part on how confident the ego vehicle is about the evidence of misbehavior. Where the confidence is high the ego vehicle can simply discard the misbehaving data and provide an alternative estimate for such data from alternative sources. Where the confidence is not high the ego vehicle can request assistance from neighboring vehicles and roadside units to provide independent estimates of the data to increase confidence in the evidence of misbehavior.
-
公开(公告)号:US11445362B2
公开(公告)日:2022-09-13
申请号:US16729077
申请日:2019-12-27
Applicant: Intel Corporation
Inventor: Xiruo Liu , Liuyang Yang , Leonardo Gomes Baltar , Moreno Ambrosin , Manoj R. Sastry
IPC: H04L29/06 , H04W12/00 , H04W72/04 , H04W4/80 , H04L9/32 , H04W4/40 , H04W12/069 , H04W12/106 , H04W12/64
Abstract: Embodiments of the present disclosure describe methods, apparatuses, storage media, and systems for a device disposed at an edge of a vehicular communication network or vehicles within a coverage area of the device. The device is to generate a list of vehicle security data to be distributed to vehicles currently within a coverage area of the device, based at least in part on a context related to the vehicles. The device is further to announce, on a control channel communicatively coupling the device and the vehicles, that the list of vehicle security data are available and a service channel to receive the list of vehicle security data. The list of vehicle security data are to be provided to the vehicles via the service channel. Other embodiments may be described and claimed.
-
-
-
-
-
-
-
-
-