×

Vehicle correlation system for cyber attacks detection and method thereof

  • US 10,516,681 B2
  • Filed: 09/21/2015
  • Issued: 12/24/2019
  • Est. Priority Date: 09/25/2014
  • Status: Active Grant
First Claim
Patent Images

1. A vehicle correlation system for detection of a probability of at least one cyber-attack on one or more vehicles the system comprising:

  • a. a plurality of first embedded software modules each installed within one of a plurality of vehicles;

    b. a plurality of second embedded software modules each installed within a road infrastructure, wherein the road infrastructure is vehicle traffic related infrastructure and is selected from a group consisting of traffic light infrastructure, stop light infrastructure, railroad crossing infrastructure, and highway interchange infrastructure;

    c. a detection server communicating with the plurality of first embedded software modules and the plurality of second embedded software modules via a network;

    wherein the plurality of first embedded software modules and the plurality of second embedded software modules are operable to transmit metadata to the detection server;

    wherein the detection server indicates a probability of a cyber-attack against one or more vehicles based on a correlation calculation between the metadata received from one or more of the plurality of first embedded software modules and metadata received from one or more of the plurality of second embedded software modules, wherein the identified probability of a cyber-attack is of a cyber-attack effecting at least one of vehicle functioning, vehicle safety, and integrity of data transmitted from one or more of the plurality of vehicles, and wherein the detection server is configured to initiate blocking vehicle-to-vehicle communication to prevent a further spread of the suspect and/or the identified threat;

    wherein the detection server uses geographic information system (GIS) for calculating the correlation;

    wherein the correlation is indicative of a member selected from a group consisting of;

    threat to one or more of the plurality of vehicles, an identified attack originated from the plurality of multiple vehicles, wherein the correlation identifies infection and spread of the identified cyber-attack based on vehicle-to-vehicle communication;

    wherein the metadata is associated with at least one of data communicated among the plurality of vehicles and data between one or more of the plurality of vehicles and the infrastructure, the metadata comprises data parameters selected from a group consisting of;

    a location of one or more of the plurality of vehicles, geographic information, a vehicle unique identification, an event time, one or more vehicle-to-vehicle communication parameters, one or more vehicle-to-infrastructure communication parameters, one or more vehicle-to-cloud communication parameters, metadata of software applications used in one or more of the plurality of vehicles.

View all claims
  • 1 Assignment
Timeline View
Assignment View
    ×
    ×