Cloud-assisted threat defense for connected vehicles
First Claim
1. A system comprising:
- a non-transient memory disposed on an associated motor vehicle and configured to store data representative of security threats related to the associated motor vehicle;
an interface operable to communicate with the associated motor vehicle and at least one source external to the associated motor vehicle; and
control logic coupled with the interface and with the memory;
wherein the control logic is operable to receive data from at least one on-board unit of the associated motor vehicle and the at least one source external to the associated motor vehicle, wherein the received data includes data representative of at least one file identified for operation on the associated motor vehicle;
wherein the control logic is operable to determine whether at least one predefined characteristic exists with respect to the file;
wherein, in response to a determination that at least one predefined characteristic exists with respect to the file and that data associated with the file is located in the memory, the control logic is operable to determine whether the file includes a security threat by analyzing the file based on the data representative of security threats stored in the memory;
wherein, in response to a determination that the data associated with the file is not located in the memory, the control logic is operable to (i) transmit data related to the file to a cloud-based component communicatively coupled to the control logic via the interface, wherein the cloud-based component is configured to store the data representative of security threats and (ii) receive a threat assessment from the cloud-based component regarding the file; and
wherein the control logic is operable to generate a signal based on at least one of determining whether the file includes the security threat and analyzing the threat assessment.
1 Assignment
0 Petitions
Accused Products
Abstract
In an example embodiment herein, there is provided methods and a system for cloud-assisted threat defense for connected vehicles. A vehicle suitably includes an on-board computer system for operating and/or controlling various systems on the vehicle. The on-board computer system suitably operates in connection with or includes an on-board threat defense module for detecting and protecting against malware attacks and other security threats to the vehicle. In an example embodiment, a cloud-based security component or security cloud assists with the detection and protection against security threats and malware attacks to the vehicle while minimizing the processing load and memory requirements for the on-board threat defense module.
-
Citations
18 Claims
-
1. A system comprising:
-
a non-transient memory disposed on an associated motor vehicle and configured to store data representative of security threats related to the associated motor vehicle; an interface operable to communicate with the associated motor vehicle and at least one source external to the associated motor vehicle; and control logic coupled with the interface and with the memory; wherein the control logic is operable to receive data from at least one on-board unit of the associated motor vehicle and the at least one source external to the associated motor vehicle, wherein the received data includes data representative of at least one file identified for operation on the associated motor vehicle; wherein the control logic is operable to determine whether at least one predefined characteristic exists with respect to the file; wherein, in response to a determination that at least one predefined characteristic exists with respect to the file and that data associated with the file is located in the memory, the control logic is operable to determine whether the file includes a security threat by analyzing the file based on the data representative of security threats stored in the memory; wherein, in response to a determination that the data associated with the file is not located in the memory, the control logic is operable to (i) transmit data related to the file to a cloud-based component communicatively coupled to the control logic via the interface, wherein the cloud-based component is configured to store the data representative of security threats and (ii) receive a threat assessment from the cloud-based component regarding the file; and wherein the control logic is operable to generate a signal based on at least one of determining whether the file includes the security threat and analyzing the threat assessment. - View Dependent Claims (2, 3, 4, 5, 6)
-
-
7. A method comprising:
-
operating control logic, coupled with an associated memory disposed in an associated motor vehicle, to communicate with at least one on-board unit of the associated motor vehicle and at least one source external to the associated motor vehicle; receiving data from the at least one on-board unit of the associated motor vehicle and the at least one source external to the associated motor vehicle, wherein the received data includes data representative of at least one file for operation on the associated motor vehicle; determining by the control logic whether at least one predefined characteristic exists with respect to the file; upon determining data associated with the file is in the memory, determining by the control logic whether the file includes a security threat by analyzing the file based on data representative of security threats stored in the memory in response to determining that at least one predefined characteristic exists with respect to the file; upon determining the data associated with the file is not located in the memory, transmitting data related to the file to a cloud-based component external to the associated motor vehicle, wherein the cloud-based component is configured to store data representative of security threats related to the associated motor vehicle; receiving a threat assessment from the cloud-based component regarding the file; and generating by the control logic a signal based on at least one of determining whether the file includes the security threat and analyzing the threat assessment. - View Dependent Claims (8, 9, 10, 11, 12)
-
-
13. Logic encoded in at least one non-transitory computer readable media for execution by a processor, and when executed by the processor operable to:
-
operate control logic, coupled to an associated memory disposed in an associated motor vehicle, to communicate with at least one on-board unit of the associated motor vehicle and at least one source external to the associated motor vehicle; receive data from at least one on-board unit of an associated motor vehicle and at least one source external to the associated motor vehicle, wherein the received data includes data representative of a file for operation on the associated motor vehicle; determine by the control logic whether at least one predefined characteristic exists with respect to the file; upon determining data associated with the file is in the memory, determine by the control logic whether the file includes a security threat by analyzing the file based on data representative of security threats stored in the memory in response to determining that at least one predefined characteristic exists with respect to the file; upon determining the data associated with the file is not located in the memory, transmit data related to the file to a cloud-based component external to the associated motor vehicle, wherein the cloud-based component is configured to store data representative of security threats related to the associated motor vehicle; receiving a threat assessment from the cloud-based component regarding the file; and generate by the control logic a signal based on at least one of determining whether the file includes the security threat and analyzing the threat assessment. - View Dependent Claims (14, 15, 16)
-
-
17. A method comprising:
-
operating control logic, coupled with an associated memory disposed in an associated motor vehicle, to communicate with at least one on-board unit of the associated motor vehicle and at least one source external to the associated motor vehicle; receiving data from the at least one on-board unit of the associated motor vehicle and the at least one source external to the associated motor vehicle, wherein the received data includes data representative of at least two files for operation on the associated motor vehicle; determining by the control logic whether at least one predefined characteristic exists with respect to the at least two files; upon determining the data associated with a first file of the two files is in the memory, determining by the control logic whether the first file includes a security threat by analyzing the first file based on data representative of security threats stored in the memory in response to determining that at least one predefined characteristic exists with respect to the first file; upon determining the data associated with a second file of the two files is not located in the memory, transmitting data related to the second file to a cloud-based component external to the associated motor vehicle, wherein the cloud-based component is configured to store data representative of security threats related to the associated motor vehicle; receiving a threat assessment from the cloud-based component regarding the second file; and generating by the control logic a signal based on at least one of determining whether the first file includes the security threat and analyzing the threat assessment.
-
-
18. Logic encoded in at least one non-transitory computer readable media for execution by a processor, and when executed by the processor operable to:
-
operate control logic, coupled to an associated memory disposed in an associated motor vehicle, to communicate with at least one on-board unit of the associated motor vehicle and at least one source external to the associated motor vehicle; receive data from at least one on-board unit of an associated motor vehicle and at least one source external to the associated motor vehicle, wherein the received data includes data representative of at least two files for operation on the associated motor vehicle; determine by the control logic whether at least one predefined characteristic exists with respect to the files; upon determining the data associated with a first file of the files is in the memory, determine by the control logic whether the first file includes a security threat by analyzing the first file based on data representative of security threats stored in the memory in response to determining that at least one predefined characteristic exists with respect to the first file; upon determining the data associated with a second file of the files is not located in the memory, transmit data related to the second file to a cloud-based component external to the associated motor vehicle, wherein the cloud-based component is configured to store data representative of security threats related to the associated motor vehicle; receive a threat assessment from the cloud-based component regarding the second file; and generate by the control logic a signal based on at least one of determining whether the first file includes the security threat and analyzing the threat assessment.
-
Specification