-
公开(公告)号:US11240659B2
公开(公告)日:2022-02-01
申请号:US16707544
申请日:2019-12-09
Applicant: INTEL CORPORATION
Inventor: Xiruo Liu , Shabbir Ahmed , Ralf Graefe , Christopher Gutierrez , Marcio Juliato , Rafael Rosales , Manoj Sastry , Liuyang Yang
IPC: H04W12/00 , H04W12/02 , H04W4/40 , H04W12/03 , H04W4/46 , H04W4/029 , H04W4/06 , H04L29/06 , H04W4/08 , H04W4/024 , H04L29/08 , H04W4/80
Abstract: Various embodiments are generally directed to techniques for providing improved privacy protection against vehicle tracking for connected vehicles of a vehicular network. For example, at least one road side unit may: identify a set of vehicles that require pseudonym changes and send an invitation for a pseudonym change event to each of the vehicles, determine at least a total number of the acceptances, determine whether the total number meets or exceeds a predetermined threshold number, send acknowledgement messages to the accepting vehicles if the threshold number is met, and form a vehicle group to coordinate the pseudonym change event during a privacy period. During the privacy period, the RSU and the vehicles may communicate with each other in a confidential and private manner via key-session-based unicast transmission, and coordinate transmission power and vehicle trajectory adjustments to maximize the benefits for safety and obfuscation for privacy.
-
公开(公告)号:US20220012371A1
公开(公告)日:2022-01-13
申请号:US17484627
申请日:2021-09-24
Applicant: Intel Corporation
Inventor: Marcio Juliato , Vuk Lesi , Christopher Gutierrez , Shabbir Ahmed , Qian Wang , Manoj Sastry
Abstract: Systems, apparatuses, and methods to mitigate effects of glitch attacks on a broadcast communication bus are provided. The voltage levels of the communication bus are repeatedly sampled to identify glitch attacks. The voltage level on the communication bus can be overdriven or overwritten to either corrupt received messages or correct received messages.
-
公开(公告)号:US11038909B2
公开(公告)日:2021-06-15
申请号:US16235812
申请日:2018-12-28
Applicant: Intel Corporation
Inventor: Marcio Juliato , Liuyang Lily Yang , Manoj Sastry , Christopher Gutierrez , Shabbir Ahmed , Vuk Lesi
IPC: B60R16/02 , H04W4/48 , H04W12/122 , H04L29/06 , B60R16/023 , H04L29/08
Abstract: Methods, apparatus, systems and articles of manufacture are disclosed for anomaly detection and recovery. An apparatus to isolate a first controller in an autonomous vehicle includes a first controller to control a reference signal of the autonomous vehicle via a communication bus, a second controller to control the reference signal of the autonomous vehicle when the first controller is compromised, and a message neutralizer to neutralize messages transmitted by the first controller when the first controller is compromised, the neutralized messages to cause the first controller to become isolated from the communication bus.
-
公开(公告)号:US20210006576A1
公开(公告)日:2021-01-07
申请号:US17025797
申请日:2020-09-18
Applicant: Intel Corporation
Inventor: Marcio Juliato , Shabbir Ahmed , Qian Wang , Christopher Gutierrez , Vuk Lesi , Manoj Sastry
Abstract: Systems, apparatuses, and methods to accelerate classification of malicious activity by an intrusion detection system are provided. An intrusion detection system can speculate on classification of labels in a random forest model based on temporary and incomplete set of features. Additionally, an intrusion detection system can classify malicious context based on a set of committed nodes in the random forest model.
-
公开(公告)号:US20190052654A1
公开(公告)日:2019-02-14
申请号:US16026413
申请日:2018-07-03
Applicant: Intel Corporation
Inventor: Marcio Juliato , Shabbir Ahmed , Santosh Ghosh , Manoj R. Sastry
Abstract: A data processing system that provides for active prevention of masquerading attacks comprises a microcontroller, a transceiver, and an active attack prevention module (AAPM) in communication with the microcontroller and the transceiver. The microcontroller enables the data processing system to operate as a node in a vehicle control system (VCS). The transceiver enables the node to communicate with a local area network (LAN) of the VCS. The AAPM enables the node to monitor the LAN for messages. In response to detecting a message on the LAN, the AAPM automatically determines whether the message falsely identifies the node as a source, based on a value in an identifier field in the message. In response to determining that the message falsely identifies the node as the source, the AAPM automatically takes at least one remedial action to neutralize the message. Other embodiments are described and claimed.
-
26.
公开(公告)号:US12301599B2
公开(公告)日:2025-05-13
申请号:US17484197
申请日:2021-09-24
Applicant: Intel Corporation
Inventor: Marcio Juliato , Javier Perez-Ramirez , Vuk Lesi , Dave Cavalcanti , Manoj Sastry , Christopher Gutierrez , Qian Wang , Shabbir Ahmed
IPC: H04L9/40
Abstract: Systems, apparatuses and methods may provide for technology that detects one or more non-compliant nodes with respect to a timing schedule, detects one or more compliant nodes with respect to the timing schedule, and identifies a malicious node based on positions of the one or more non-compliant nodes and the one or more compliant nodes in a network topography. The non-compliant node(s) and the compliant node(s) may be detected based on post-synchronization messages, historical attribute data and/or plane diversity data.
-
公开(公告)号:US12205065B2
公开(公告)日:2025-01-21
申请号:US16994089
申请日:2020-08-14
Applicant: Intel Corporation
Inventor: Christopher Gutierrez , Marcio Juliato , Qian Wang , Shabbir Ahmed , Vuk Lesi , Manoj Sastry
IPC: G06Q10/0833 , G08G1/00 , H04L9/08 , H04L9/32
Abstract: Systems, apparatuses, and methods to attest to and verify the integrity of cargo during transport by an autonomous vehicle are provided. An autonomous vehicle can discretize parameters associated with transportation of cargo and can generate a keyed hash digest from the discretized parameters. The keyed hash digest can be sent to a stakeholder in the transportation of the cargo to attest to the integrity of the cargo during transport.
-
公开(公告)号:US12148061B2
公开(公告)日:2024-11-19
申请号:US17133076
申请日:2020-12-23
Applicant: Intel Corporation
Inventor: Vuk Lesi , Qian Wang , Christopher Gutierrez , Marcio Rogerio Juliato , Shabbir Ahmed , Manoj R. Sastry
IPC: G06Q50/47
Abstract: Systems and techniques for malicious request detection in automated resource dispatch are described herein. A request for a resource may be received from a user device. A location may be obtained for delivery of the resource. Sensor data may be retrieved for the location. The sensor data and user profile data may be evaluated to determine if the request is malicious. A disincentivizing message may be generated based on the determination that the request is malicious. In response to receipt of a response to the disincentivizing message, a resource may be dispatched to the location.
-
公开(公告)号:US12095782B2
公开(公告)日:2024-09-17
申请号:US17706955
申请日:2022-03-29
Applicant: Intel Corporation
Inventor: Christopher Gutierrez , Vuk Lesi , Manoj Sastry , Christopher Hall , Marcio Juliato , Shabbir Ahmed , Qian Wang
CPC classification number: H04L63/1416 , H04J3/0667 , H04L63/145 , H04L63/1475
Abstract: Techniques to secure a time sensitive network are described. An apparatus may establish a data stream between a first device and a second device in a network domain, the network domain includes a plurality of switching nodes, receive messages from the first device by the second device in the network domain, the messages to comprise time information to synchronize a first clock for the first device and a second clock for the second device to a network time for the network domain, update a correction field for a received message with a residence time and time delay value by the second device, determine whether the updated message is benign or malicious, update the correction field for the updated message with an inference time when the updated message is benign, and prevent relay of the updated message to other devices in the network domain when the updated message is malicious.
-
公开(公告)号:US20240223585A1
公开(公告)日:2024-07-04
申请号:US18090682
申请日:2022-12-29
Applicant: Intel Corporation
Inventor: Christopher Gutierrez , Vuk Lesi , Marcio Juliato , Manoj Sastry , Shabbir Ahmed
CPC classification number: H04L63/1425 , H04J3/0667 , H04L63/1416
Abstract: Techniques include receiving a message with time information at an ingress queue for an ingress interface of an intrusion detection system (IDS), the IDS to monitor a network node of a time-synchronized network (TSN), generating an entrance timestamp for the message, the entrance timestamp to comprise a time value representing when the message is received at the ingress queue of the ingress interface of the IDS, inspecting the message for indications of a security attack by the IDS, generating an exit timestamp for the message, the exit timestamp to comprise a time value representing when the message is received at an egress queue of an egress interface of the IDS, and generating an inspection time interval associated with the IDS, the inspection time interval to represent a time interval between the entrance timestamp and the exit timestamp for the message while transiting the IDS. Other embodiments are described and claimed.
-
-
-
-
-
-
-
-
-