×

Cloud-assisted threat defense for connected vehicles

  • US 9,282,110 B2
  • Filed: 11/27/2013
  • Issued: 03/08/2016
  • Est. Priority Date: 11/27/2013
  • Status: Active Grant
First Claim
Patent Images

1. A system comprising:

  • a non-transient memory disposed on an associated motor vehicle and configured to store data representative of security threats related to the associated motor vehicle;

    an interface operable to communicate with the associated motor vehicle and at least one source external to the associated motor vehicle; and

    control logic coupled with the interface and with the memory;

    wherein the control logic is operable to receive data from at least one on-board unit of the associated motor vehicle and the at least one source external to the associated motor vehicle, wherein the received data includes data representative of at least one file identified for operation on the associated motor vehicle;

    wherein the control logic is operable to determine whether at least one predefined characteristic exists with respect to the file;

    wherein, in response to a determination that at least one predefined characteristic exists with respect to the file and that data associated with the file is located in the memory, the control logic is operable to determine whether the file includes a security threat by analyzing the file based on the data representative of security threats stored in the memory;

    wherein, in response to a determination that the data associated with the file is not located in the memory, the control logic is operable to (i) transmit data related to the file to a cloud-based component communicatively coupled to the control logic via the interface, wherein the cloud-based component is configured to store the data representative of security threats and (ii) receive a threat assessment from the cloud-based component regarding the file; and

    wherein the control logic is operable to generate a signal based on at least one of determining whether the file includes the security threat and analyzing the threat assessment.

View all claims
  • 1 Assignment
Timeline View
Assignment View
    ×
    ×