WO2025042357A1 - A cyber security system for protecting vehicle control unit from cyber-attacks - Google Patents
A cyber security system for protecting vehicle control unit from cyber-attacks Download PDFInfo
- Publication number
- WO2025042357A1 WO2025042357A1 PCT/TR2023/050873 TR2023050873W WO2025042357A1 WO 2025042357 A1 WO2025042357 A1 WO 2025042357A1 TR 2023050873 W TR2023050873 W TR 2023050873W WO 2025042357 A1 WO2025042357 A1 WO 2025042357A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- cyber security
- user
- electronic system
- unit
- terminal
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/12—Detection or prevention of fraud
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3234—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving additional secure or trusted devices, e.g. TPM, smartcard, USB or software token
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/04—Key management, e.g. using generic bootstrapping architecture [GBA]
- H04W12/043—Key management, e.g. using generic bootstrapping architecture [GBA] using a trusted network node as an anchor
- H04W12/0433—Key management protocols
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/06—Authentication
- H04W12/069—Authentication using certificates or pre-shared keys
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/50—Secure pairing of devices
Definitions
- the invention relates to a cyber security system for enabling the authorization of access to an electronic system whose access is desired to be protected.
- Security systems are the integration of technological devices and tools designed to protect individuals and commercial areas as well as information and other valuable assets from unauthorized access, theft and various potential threats. The purpose of these systems is to detect possible risks early, to take preventive measures against these risks and to react quickly when necessary. Security systems in the technical field are quite diverse. These systems also include access control systems.
- Access Permit Devices are electronic or mechanical devices used to control and limit access to a specific area, information, or device. When access is requested by a person or system, these devices allow or block such access within the specified rules or conditions. Access permission devices are often used in physical security systems (door locks, turnstiles, etc.) and information technology security systems (encryption, authentication, etc.). These devices are used to prevent unauthorized access, protect privacy, and ensure the security of certain assets or information.
- the present invention relates to a cyber security for eliminating the above-mentioned disadvantages and bringing new advantages to the related technical field.
- An object of the invention is to provide a cyber security system that protects electronic control systems against cyber- attacks.
- Another object of the invention is to provide a cyber security system that increases the cyber security level of the vehicles by controlling the CAN lines directed to the vehicle brain.
- Another object of the invention is to provide a cyber security module suitable for various environments, providing simple installation and not incompatible with existing electronic control systems.
- the present invention is a cyber security system for enabling the authorization of access to an electronic system whose access is desired to be protected in order to realize all the objects that will emerge from the abovementioned and the following detailed description. Accordingly, it comprises a cyber security module having a control end connected to the electronic system in a way to control said electronic system, a processor unit connected to said control end, a memory unit in which the processor unit is related to read and write data and in which user keys and user authorizations corresponding to these user keys are stored, and a communication unit suitable for communicating with a mobile terminal; an image capture unit is configured to send the commands received from the user terminal to the electronic system within the user authorization by activating the user key corresponding to the user key in which the pairing takes place; and a user terminal having a terminal arranged to perform a face recognition-based authentication through a server with the image received from said image capture unit and to send a user key to said cyber security module in case of successful authentication; said processor unit of the cyber security module is configured to send the commands received from the user terminal to the electronic
- a possible embodiment of the invention is characterized in that said electronic system is a vehicle control system.
- said electronic system is a vehicle control system.
- said cyber security module comprises a body and a pairing signal provided on said body and in which information about a device pairing process is embedded; in the event that the terminal processor unit receives the image of the pairing signal via the image capture unit, it is configured to detect the information contained in the pairing signal and perform the device pairing process with the cyber security module according to said information.
- Another possible embodiment of the invention is characterized in that said pairing signal is QR code.
- Another possible embodiment of the invention is characterized in that said recording memory is provided on the server or user terminal.
- said recording memory is provided on the server or user terminal.
- control end is suitable for connection to vehicle CAN lines.
- Figure 1 shows a representative view of the cyber security system.
- Figure 2 shows a schematic view of the cyber security system.
- the present invention is a cyber security system (10) for enabling access authorization to an electronic system (500) whose access needs to be protected, with reference to Figure 1 .
- This cyber security system (10) essentially comprises a cyber security module (100) that can be electrically connected to an electronic system (500) whose access needs to be protected, a server (300) that controls authentication and authorization control, a user terminal (200) that sends an access request to the cyber security module (100) with authentication received from the server.
- a communication network (400) is provided between the user terminal (200) and the server (300).
- Said electronic system (500) may be any system whose access is desired to be protected, such as a vehicle control system, a door control system, etc.
- a pairing signal (130) is provided in the cyber security module (100) in a possible embodiment of the relevant system.
- the pairing signal allows the cyber security module (100) and the user terminal (200) to be matched.
- the pairing signal (130) is scanned through the user terminal carrying the access authorization holder credentials and the credentials are transmitted to the cyber security module.
- This cyber security module which contains user credentials, is connected to the electronic system, which is intended to protect access, by electrical cables.
- the electronic system desired to be protected here may be the "CAN" lines of a vehicle.
- the system to be protected can be any system such as a door controlling the passage to an area, any system of the vehicle, etc.
- This pairing signal (130) may be a QR code.
- the identified cyber security system (10) consists of the cyber security module (100) capable of being electrically connected to an electronic system (500) and capable of being electronically connected using a control end, a user terminal (200) requesting access to that cyber security module (100), and the server (300) performing authentication and authorization operations.
- Establishing a wireless communication protocol between the relevant cyber security module (100) and the user terminal (200) ensures that the access request is transmitted, and the digital key created by the user terminal (200) is transferred to the cyber security module (100).
- the image capture module in the user terminal 200 captures the snapshot of the user's face. These captured facial images are verified by an authentication module located on a server (300). If the authentication processes are positive, a digital key for the user at the user terminal (200) is accessed. The digital key may be generated by a key generation module or provided by the server (300). This generated digital key is transmitted to the cyber security module (100). The cyber security module (100) checks whether the transmitted digital key is compatible with the predefined digital key in itself and authorizes the user to access it if compatibility is achieved.
- the relevant processor unit checks whether the digital key transmitted to the cyber security module (100) is compatible with the predefined digital key within it and authorizes the user to access it if it is compatible.
- This processor may be the "ESP32" microcontroller.
- the processor unit (110) is associated with the specified memory unit (120).
- the memory unit (120) includes the combination of memory that can store data both permanently and temporarily.
- the communication unit (140) is a wireless communication module that transmits data between the cyber security module (100) and the user terminal (200). This wireless communication module may be a WiFi or Bluetooth.
- the structure of the specified control end (150) is suitable for connecting to the CAN lines of the vehicle and is designed for the vehicle to be able to connect and supervise each CAN line independently.
- the user terminal (200) comprises an image capture unit (210), an interface containing user information, a terminal processor unit (230), a terminal communication unit (240), and a recording memory (250) that stores the recording information received from the electronic system (500).
- the user information specified here may include the user's identity information, driver's license information and facial images. Registration information includes any information obtained by the sensors of the controlled system, such as odometer information, engine status and CAN line information.
- the image capture unit (210) may be a camera located in the user terminal (200).
- the user terminal (200) may be smart mobile phone, a computer, a tablet, a smartphone, etc.
- the terminal processor unit (230) is a processor module located on the server (300) that performs face recognition and authentication. This processor module may be one of the processors such as a microprocessor, CPU, GPU.
- the terminal communication unit (240) may be a wireless communication module that performs wireless data exchange between the cyber security module (100) and the user terminal (200).
- a recording memory (250) that allows the loss of the recording information received from the electronic system (500) may be provided in the electronic system (500).
- QR code pairing method and face recognition-based authentication method are known in the technical literature; descriptions of these methods are presented below.
- the QR code pairing method is a method in which QR codes are scanned between two or more items using QR (Quick Response) codes to match, verify, or transmit the information they contain.
- Face recognition-based authentication method is a method that confirms the identity of the individual by detecting the facial details of the individual through the camera and pairing this information with a database.
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Alarm Systems (AREA)
Abstract
It relates to the cyber security system (10) for enabling the authorization to access an electronic system (500) whose access is desired to be protected. It comprises a cyber security module (100) having a control end (150) connected to the electronic system (500) in a way to control said electronic system (500), a processor unit (150) connected to said control end (150), a memory unit (120) to which the processor unit is related to read and write data and in which user keys and user authorizations corresponding to these user keys are stored, and a communication unit (140) suitable for communication with a mobile terminal; that it comprises a user terminal (200) having an image capture unit (210), a terminal processor unit (230) arranged to perform a facial recognition-based authentication via a server (300) with the image received from said image capture unit (210) and, if the authentication is successful, to send a user key to said cyber security module (100) with which device pairing has been previously performed; that, in case the user key received from the said user terminal (200) matches the user keys in the memory unit (120), the processor unit of the cyber security module (100) is configured to send the commands received from the user terminal (200) to the electronic system (500) within the user authorization by activating the user authorization corresponding to the user key with which the match occurred.
Description
A CYBER SECURITY SYSTEM FOR PROTECTING VEHICLE CONTROL UNIT FROM CYBER-ATTACKS
TECHNICAL FIELD
The invention relates to a cyber security system for enabling the authorization of access to an electronic system whose access is desired to be protected.
BACKGROUND
Security systems are the integration of technological devices and tools designed to protect individuals and commercial areas as well as information and other valuable assets from unauthorized access, theft and various potential threats. The purpose of these systems is to detect possible risks early, to take preventive measures against these risks and to react quickly when necessary. Security systems in the technical field are quite diverse. These systems also include access control systems.
Access Permit Devices are electronic or mechanical devices used to control and limit access to a specific area, information, or device. When access is requested by a person or system, these devices allow or block such access within the specified rules or conditions. Access permission devices are often used in physical security systems (door locks, turnstiles, etc.) and information technology security systems (encryption, authentication, etc.). These devices are used to prevent unauthorized access, protect privacy, and ensure the security of certain assets or information.
These systems are used to ensure the security of a physical environment, such as controlling doors and regulating access permits, from homes to offices, from hospitals to multi-story buildings.
These systems are usually integrated into areas that we want to be protected, for example a door control mechanism. This requires a qualified person to perform such operations in order to prevent physical or technical damage, such as improper assembly or incompatibility, during the assembly or disassembly of the device from one system to another. This leads to extra costs and labor requirements.
In addition, the cyber security of vehicles has gained vital importance with the spread of digital technologies today. In this context, it aims to keep this security at the highest level by providing access to important components and data in the vehicle only to authorized users or applications using access control systems. Such systems are integrated into the in-vehicle network system (e.g., CAN bus) is included in the computer system (ECU) in the vehicle to restrict access. However, since many of these technologies are designed in the form of an electronic board integrated with the vehicle's central unit, there are several challenges such as installation, maintenance, and high cost.
As a result, all the above-mentioned problems have made it imperative to innovate in the relevant technical field.
BRIEF DESCRIPTION OF THE INVENTION
The present invention relates to a cyber security for eliminating the above-mentioned disadvantages and bringing new advantages to the related technical field.
An object of the invention is to provide a cyber security system that protects electronic control systems against cyber- attacks.
Another object of the invention is to provide a cyber security system that increases the cyber security level of the vehicles by controlling the CAN lines directed to the vehicle brain.
Another object of the invention is to provide a cyber security module suitable for various environments, providing simple installation and not incompatible with existing electronic control systems.
The present invention is a cyber security system for enabling the authorization of access to an electronic system whose access is desired to be protected in order to realize all the objects that will emerge from the abovementioned and the following detailed description. Accordingly, it comprises a cyber security module having a control end connected to the electronic system in a way to control said electronic system, a processor unit connected to said control end, a memory unit in which the processor unit is related to read and write data and in which user keys and user authorizations corresponding to these user keys are stored, and a communication unit suitable for communicating with a mobile terminal; an image capture unit is configured to send the commands received from the user terminal to the electronic system within the user authorization by activating the user key corresponding to
the user key in which the pairing takes place; and a user terminal having a terminal arranged to perform a face recognition-based authentication through a server with the image received from said image capture unit and to send a user key to said cyber security module in case of successful authentication; said processor unit of the cyber security module is configured to send the commands received from the user terminal to the electronic system within the user authorization. Thus, while only authorized persons are provided with access to an electronic system whose access is desired to be protected by facial recognition-based authentication methods, the cyber security level of these electronic systems is also increased.
A possible embodiment of the invention is characterized in that said electronic system is a vehicle control system. Thus, vehicles are protected against cyber security attacks.
Another possible embodiment of the invention is characterized in that said cyber security module comprises a body and a pairing signal provided on said body and in which information about a device pairing process is embedded; in the event that the terminal processor unit receives the image of the pairing signal via the image capture unit, it is configured to detect the information contained in the pairing signal and perform the device pairing process with the cyber security module according to said information.
Another possible embodiment of the invention is characterized in that said pairing signal is QR code.
Another possible embodiment of the invention is characterized in that the user terminal is configured to store the recording information received from the electronic system in a recording memory. Thus, it is ensured that basic information about the electronic system is stored.
Another possible embodiment of the invention is characterized in that said recording memory is provided on the server or user terminal. Thus, the stored information about the electronic system is analyzed and a report is prepared about the operation of the system.
Another possible embodiment of the invention is characterized in that said control end is suitable for connection to vehicle CAN lines.
Another possible embodiment of the invention is characterized in that said control end is designed to be independently connected to and control each CAN line of the vehicle. Thus,
the CAN lines directed to the vehicle's brain are independently protected against cyber threats. This increases the cyber security level of the vehicle.
BRIEF DESCRIPTION OF THE FIGURES
Figure 1 shows a representative view of the cyber security system.
Figure 2 shows a schematic view of the cyber security system.
DETAILED DESCRIPTION OF THE INVENTION
In this detailed description, the cyber security system (10) of the invention is explained only by means of examples that do not have any limiting effect for a better understanding of the subject matter.
The present invention is a cyber security system (10) for enabling access authorization to an electronic system (500) whose access needs to be protected, with reference to Figure 1 . This cyber security system (10) essentially comprises a cyber security module (100) that can be electrically connected to an electronic system (500) whose access needs to be protected, a server (300) that controls authentication and authorization control, a user terminal (200) that sends an access request to the cyber security module (100) with authentication received from the server. A communication network (400) is provided between the user terminal (200) and the server (300). Said electronic system (500) may be any system whose access is desired to be protected, such as a vehicle control system, a door control system, etc.
A pairing signal (130) is provided in the cyber security module (100) in a possible embodiment of the relevant system. The pairing signal allows the cyber security module (100) and the user terminal (200) to be matched.
The pairing signal (130) is scanned through the user terminal carrying the access authorization holder credentials and the credentials are transmitted to the cyber security module. This cyber security module, which contains user credentials, is connected to the electronic system, which is intended to protect access, by electrical cables. The electronic system desired to be protected here may be the "CAN" lines of a vehicle. The system to be protected can be any system such as a door controlling the passage to an area, any system of the vehicle, etc. This pairing signal (130) may be a QR code.
Referring to Figure 2, the identified cyber security system (10) consists of the cyber security module (100) capable of being electrically connected to an electronic system (500) and capable of being electronically connected using a control end, a user terminal (200) requesting access to that cyber security module (100), and the server (300) performing authentication and authorization operations. Establishing a wireless communication protocol between the relevant cyber security module (100) and the user terminal (200) ensures that the access request is transmitted, and the digital key created by the user terminal (200) is transferred to the cyber security module (100).
When access to the access protected electronic system (500) is requested through the cyber security module (100), the image capture module in the user terminal 200 captures the snapshot of the user's face. These captured facial images are verified by an authentication module located on a server (300). If the authentication processes are positive, a digital key for the user at the user terminal (200) is accessed. The digital key may be generated by a key generation module or provided by the server (300). This generated digital key is transmitted to the cyber security module (100). The cyber security module (100) checks whether the transmitted digital key is compatible with the predefined digital key in itself and authorizes the user to access it if compatibility is achieved.
The relevant processor unit checks whether the digital key transmitted to the cyber security module (100) is compatible with the predefined digital key within it and authorizes the user to access it if it is compatible. This processor may be the "ESP32" microcontroller. The processor unit (110) is associated with the specified memory unit (120). The memory unit (120) includes the combination of memory that can store data both permanently and temporarily. The communication unit (140) is a wireless communication module that transmits data between the cyber security module (100) and the user terminal (200). This wireless communication module may be a WiFi or Bluetooth. The structure of the specified control end (150) is suitable for connecting to the CAN lines of the vehicle and is designed for the vehicle to be able to connect and supervise each CAN line independently.
The user terminal (200) comprises an image capture unit (210), an interface containing user information, a terminal processor unit (230), a terminal communication unit (240), and a recording memory (250) that stores the recording information received from the electronic system (500). The user information specified here may include the user's identity information, driver's license information and facial images. Registration information includes any information obtained by the sensors of the controlled system, such as odometer information, engine status and CAN line information. The image capture unit (210) may be a camera
located in the user terminal (200). The user terminal (200) may be smart mobile phone, a computer, a tablet, a smartphone, etc. The terminal processor unit (230) is a processor module located on the server (300) that performs face recognition and authentication. This processor module may be one of the processors such as a microprocessor, CPU, GPU. The terminal communication unit (240) may be a wireless communication module that performs wireless data exchange between the cyber security module (100) and the user terminal (200).
In a possible embodiment of the invention, a recording memory (250) that allows the loss of the recording information received from the electronic system (500) may be provided in the electronic system (500).
The above-mentioned QR code pairing method and face recognition-based authentication method are known in the technical literature; descriptions of these methods are presented below.
The QR code pairing method is a method in which QR codes are scanned between two or more items using QR (Quick Response) codes to match, verify, or transmit the information they contain.
Face recognition-based authentication method is a method that confirms the identity of the individual by detecting the facial details of the individual through the camera and pairing this information with a database.
The protection scope of the invention is specified in the appended claims and cannot be limited to those explained in this detailed description for illustrative purposes. It is evident that a person skilled in the art may exhibit similar embodiments in light of the foregoing without departing from the main theme of the invention.
REFERENCE NUMBERS GIVEN IN THE FIGURES
10 Cyber security system
100 Cyber security module
105 Body
110 Processor unit
120 Memory unit
130 Pairing signal
140 Communication unit
150 Control end
200 User terminal
210 Image capture unit
220 User interface
230 Terminal processor unit
240 Terminal communication unit
250 Recording memory
300 Server
400 Communication network
500 Electronic system
Claims
1. A cyber security system (10) for enabling the activation of access authorization to an electronic system (500) whose access is to be protected, characterized in that it comprises a cyber security module (100) having a control end (150) connected to the electronic system (500) in a way to control said electronic system (500), a processor unit (150) connected to said control end (150), a memory unit (120) to which the processor unit is related to read and write data and in which user keys and user authorizations corresponding to these user keys are stored, and a communication unit (140) suitable for communication with a mobile terminal; that it comprises a user terminal (200) having an image capture unit (210), a terminal processor unit (230) arranged to perform a facial recognition-based authentication via a server (300) with the image received from said image capture unit (210) and, if the authentication is successful, to send a user key to said cyber security module (100) with which device pairing has been previously performed; that, in case the user key received from the said user terminal (200) matches the user keys in the memory unit (120), the processor unit of the cyber security module (100) is configured to send the commands received from the user terminal (200) to the electronic system (500) within the user authorization by activating the user authorization corresponding to the user key with which the match occurred.
2. A cyber security system (10) according to Claim 1 , characterized in that said electronic system (500) is a vehicle control system.
3. A cyber security system (10) according to Claim 1 , characterized in that said cyber security module (100) comprises a body (105) and a pairing signal on said body (105), in which the information related to a device pairing process is embedded; the terminal processor unit (230) is configured to detect the information contained in the pairing signal in case it receives the image of the pairing signal through the image capture unit (210) and to perform device pairing with the cyber security module (100) according to the said information.
4. A cyber security system (10) according to Claim 1 , characterized in that said pairing signal (130) is QR code.
5. A cyber security system (10) according to Claim 1 , characterized in that the user terminal (200) is configured to record the recording information received from the electronic system (500) to a recording memory (250).
6. A cyber security system (10) according to Claim 5, characterized in that said recording memory (250) is provided on the server (300) or user terminal (200).
7. A cyber security system (10) according to Claim 2, characterized in that said control end (150) is suitable for connecting to vehicle CAN lines.
8. A cyber security system (10) according to Claim 7, characterized in that said control end (150) is designed to independently connect to and control each CAN line of the vehicle.
Applications Claiming Priority (2)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| TR2023/010333 TR2023010333A2 (en) | 2023-08-24 | A CYBER SECURITY SYSTEM THAT PROTECTS THE BRAIN OF VEHICLES FROM CYBER ATTACKS | |
| TR2023010333 | 2023-08-24 |
Publications (1)
| Publication Number | Publication Date |
|---|---|
| WO2025042357A1 true WO2025042357A1 (en) | 2025-02-27 |
Family
ID=94732631
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| PCT/TR2023/050873 Pending WO2025042357A1 (en) | 2023-08-24 | 2023-08-28 | A cyber security system for protecting vehicle control unit from cyber-attacks |
Country Status (1)
| Country | Link |
|---|---|
| WO (1) | WO2025042357A1 (en) |
Citations (4)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US20180012224A1 (en) * | 2016-07-07 | 2018-01-11 | NextEv USA, Inc. | Methods and systems for communicating estimated time of arrival to a third party |
| EP3288214A1 (en) * | 2015-04-23 | 2018-02-28 | Unho Choi | Authentication in ubiquitous environment |
| US20180338241A1 (en) * | 2013-10-04 | 2018-11-22 | Sol Mingso Li | Systems and methods for programming, controlling and monitoring wireless networks |
| US20220108120A1 (en) * | 2020-10-01 | 2022-04-07 | Ford Global Technologies, Llc | Biometric wireless vehicle entry system |
-
2023
- 2023-08-28 WO PCT/TR2023/050873 patent/WO2025042357A1/en active Pending
Patent Citations (4)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US20180338241A1 (en) * | 2013-10-04 | 2018-11-22 | Sol Mingso Li | Systems and methods for programming, controlling and monitoring wireless networks |
| EP3288214A1 (en) * | 2015-04-23 | 2018-02-28 | Unho Choi | Authentication in ubiquitous environment |
| US20180012224A1 (en) * | 2016-07-07 | 2018-01-11 | NextEv USA, Inc. | Methods and systems for communicating estimated time of arrival to a third party |
| US20220108120A1 (en) * | 2020-10-01 | 2022-04-07 | Ford Global Technologies, Llc | Biometric wireless vehicle entry system |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| JP6937764B2 (en) | Systems and methods for controlling access to physical space | |
| JP7079805B2 (en) | Time-limited secure access | |
| JP4524306B2 (en) | Authorization method | |
| US10645578B2 (en) | System for using mobile terminals as keys for vehicles | |
| EP1629624B1 (en) | An in-curcuit security system and methods for controlling access to and use of sensitive data | |
| CN103097970B (en) | Systems and methods for providing secure remote access to robot controllers | |
| US20030115474A1 (en) | System and method for validating the identity of a camera used in secure access applications employing biometrics | |
| CN111868726B (en) | Electronic device and digital key supply method for electronic device | |
| US7480805B1 (en) | Method and system for identifying and processing an unauthorized access request | |
| KR20090094240A (en) | Method, apparatus and system for authentication of external storage devices | |
| US20070109098A1 (en) | System for providing network access security | |
| JP2009181561A (en) | Security management system using biometric authentication | |
| US9111084B2 (en) | Authentication platform and related method of operation | |
| US10255427B2 (en) | Authorization of unique computer device specimens | |
| JP4629452B2 (en) | Industrial equipment and remote access system for industrial equipment | |
| CN105787319B (en) | Portable terminal based on iris recognition and method thereof | |
| CN106250758A (en) | A kind of storage device connection control method and system | |
| WO2025042357A1 (en) | A cyber security system for protecting vehicle control unit from cyber-attacks | |
| CN107077666A (en) | Method and apparatus for being authorized to the action at self-aid system | |
| US7861294B2 (en) | Presence-based access control | |
| TR2023010333A2 (en) | A CYBER SECURITY SYSTEM THAT PROTECTS THE BRAIN OF VEHICLES FROM CYBER ATTACKS | |
| WO2019246024A1 (en) | Systems and methods for computer security | |
| Wang et al. | A security module for car appliances | |
| JP2007052514A (en) | Target device and authentication method | |
| EP1684204A1 (en) | Presence-based access control |
Legal Events
| Date | Code | Title | Description |
|---|---|---|---|
| 121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 23949889 Country of ref document: EP Kind code of ref document: A1 |