×

On board vehicle network security

  • US 9,173,100 B2
  • Filed: 03/14/2013
  • Issued: 10/27/2015
  • Est. Priority Date: 11/16/2011
  • Status: Active Grant
First Claim
Patent Images

1. A vehicle, comprising:

  • a plurality of on board computational components;

    a first security mechanism to enforce a security measure and form a perimeter network logically including the plurality of on board computational components; and

    a microprocessor executable network controller operable to (i) detect an instance of a breach of the security measure, (ii) determine whether a computational component affected by the instance of a breach of the security measure can be isolated from at least one on board computational component not affected by or potentially affected by the instance of a breach of the security measure, and (iii) when the computational component affected by the instance of a breach of the security measure can be isolated from the at least one on board computational component not affected by or potentially affected by the instance of a breach of the security measure, at least one of (a) isolate the at least one on board computational component not affected by or potentially affected by the instance of a breach of a security measure from the computational component affected by the instance of a breach of a security measure and (b) isolate the computational component affected by the instance of a breach of a security measure from the at least one on board computational component not affected by or potentially affected by the instance of a breach of a security measure, wherein the isolation is one or more of;

    (1) denying vehicular wireless network access to the computational component affected by the instance of a breach of a security measure, (2) directing communications to and from the computational component affected by the instance of a breach of a security measure to a firewall and/or gateway to enforce a security measure, (3) blocking communications to and from the computational component affected by the instance of a breach of a security measure, and (4) activating a second security mechanism in response to the instance of a breach of a security measure.

View all claims
  • 2 Assignments
Timeline View
Assignment View
    ×
    ×