Method for digital key misbehavior and sybil attack detection through user profiling

A key, digital technology, applied in the field of digital key misbehavior and sybil attack detection through user archives, which can solve problems such as vehicle security damage

Active Publication Date: 2021-04-06
GM GLOBAL TECH OPERATIONS LLC
View PDF3 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

During this exploit, the security of the vehicle was breached when many counterfeit copies of the compromised digital key attempted to gain access to the vehicle within a short period of time

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for digital key misbehavior and sybil attack detection through user profiling
  • Method for digital key misbehavior and sybil attack detection through user profiling
  • Method for digital key misbehavior and sybil attack detection through user profiling

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0069] Embodiments of the present disclosure generally describe a technique to detect bad behavior and Sybil attacks in digital key creation and sharing by identifying key aspects of system and / or user behavior. Inconsistencies in the spatial and / or temporal distribution of generated digital keys may invoke alert notifications from vehicle backend systems. This technique typically builds a detection system built around a digital key system that enhances attack detection capabilities. A Sybil attack typically involves generating many inappropriate (or invalid) digital key-sharing requests that prevent the electronic circuitry utilizing the digital key from distinguishing between valid and invalid requests.

[0070] The definition of the characteristics that make up the behavior pattern of the issued digital keys can be established on a per user basis. The technique typically derives user patterns through statistical analysis and archives them. Statistical analysis can establi...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to a method for digital key misbehavior and sybil attack detection through user profiling, and concretely discloses a digital key sharing system. The digital key sharing system includes an electronic circuit and a first server computer. The electronic circuit is configured to store a plurality of digital keys, receive a plurality of key sharing requests, and generate a plurality of features in response to the plurality of key sharing requests. The first server computer is in wireless communication with the electronic circuit and is configured to generate an alert signal in response to finding one or more anomalies in the plurality of features to initiate a notification to a primary user device associated with the electronic circuit, and send a suspend notification signal to the electronic circuit in response to the finding of the one or more anomalies in the plurality of features. The electronic circuit is further configured to suspend use of the plurality of digital keys in response to reception of the suspend notification signal.

Description

Background technique [0001] In the automotive world, the use of digital keys instead of physical keys is becoming more and more common. A number of automakers are working on proprietary solutions that allow owners to gain access to their vehicles using smart devices in close proximity to the vehicle. This access may include locking / unlocking of doors and starting / stopping of the engine. Having the digital key resident on the smart device also enables a degree of key sharing among attached smart devices. However, if one of these smart devices is compromised, the digital keys stored therein can be used to exploit the vehicle. During this exploit, the security of the vehicle was compromised when many counterfeit copies of the compromised digital key attempted to gain access to the vehicle within a short period of time. [0002] What is needed is a technique to detect out-of-sequence keys and / or suspicious key-sharing request behavior. Contents of the invention [0003] A di...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/08H04L9/14H04L9/32
CPCH04L9/085H04L9/14H04L9/3247H04L9/3263H04W12/121H04W4/023H04W4/80G07C9/00309G07C9/00571G07C9/00857G07C2009/00865G07C2009/0088B60R25/24B60R2325/205H04W12/06H04W12/08
Inventor E·帕拉斯克瓦斯陈劲竹F·白J·塞尔加基斯
Owner GM GLOBAL TECH OPERATIONS LLC
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products