Method and system for preventing telematics remote controlled vehicles from being attacked by external hackers
A technology of telematics and hacking, which is applied in the field of preventing telematics remote-controlled vehicles from being attacked by external hackers and systems, which can solve problems such as security loopholes and achieve the effect of improving security
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0028] Hereinafter, the present invention will be described more fully with reference to the accompanying drawings showing embodiments of the invention. As those skilled in the art would realize, the described embodiments may be modified in various different ways, all without departing from the spirit or scope of the present invention.
[0029] Furthermore, throughout the specification, unless expressly stated to the contrary, the word "comprise" and variations such as "comprises" or "comprises" should be understood to mean the inclusion of stated elements but not the exclusion of any other elements.
[0030] figure 2 is a view showing an example of a vehicle network of a telematics remote-controlled vehicle to which an exemplary embodiment of the present invention is applied. refer to figure 2 , the telematics multimedia unit (TMU) 100 according to an exemplary embodiment of the present invention communicates with a battery control module (BCM), a traction control unit (T...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com