Sign In to Follow Application
View All Documents & Correspondence

System To Audit And Update At Least One Electronic Control Unit Of A Vehicle

Abstract: ABSTRACT SYSTEM TO AUDIT AND UPDATE AT LEAST ONE ELECTRONIC CONTROL UNIT OF A VEHICLE The present disclosure discloses a system to audit and update at least one electronic control unit (ECU) of a vehicle. The system comprises an update server operable to store, configure, and transmit update packages. The update server comprises a secure storage unit retaining configuration data associated with a plurality of vehicles and a package validation unit verifying update packages before transmission. A communication interface establishes a secure connection between the update server and at least one ECU to transmit update packages and receive audit data. A vehicle update manager within the vehicle receives update packages and authenticates received update packages using a stored vehicle identifier and secure configuration data. A hashing unit computes a hash value based on a combination of the vehicle identifier and secure configuration data to validate integrity and prevent unauthorized modifications. A modification control unit modifies at least one ECU upon validation and updates software or firmware with a corresponding timestamp.

Get Free WhatsApp Updates!
Notices, Deadlines & Correspondence

Patent Information

Application #
Filing Date
27 March 2024
Publication Number
14/2025
Publication Type
INA
Invention Field
COMPUTER SCIENCE
Status
Email
Parent Application

Applicants

Matter Motor Works Private Limited
301, PARISHRAM BUILDING, 5B RASHMI SOC., NR. MITHAKHALI SIX ROADS, NAVRANGPURA AHMEDABAD, GUJARAT, INDIA - 380010

Inventors

1. KUMAR PRASAD TELIKEPALLI
301, PARISHRAM BUILDING, 5B RASHMI SOC., NR. MITHAKHALI SIX ROADS, NAVRANGPURA AHMEDABAD, GUJARAT, INDIA - 380010
2. RAMACHANDRAN R
301, PARISHRAM BUILDING, 5B RASHMI SOC., NR. MITHAKHALI SIX ROADS, NAVRANGPURA AHMEDABAD, GUJARAT, INDIA - 380010
3. PANKAJ KUMAR BHARTI
301, PARISHRAM BUILDING, 5B RASHMI SOC., NR. MITHAKHALI SIX ROADS, NAVRANGPURA AHMEDABAD, GUJARAT, INDIA - 380010

Specification

DESC:SYSTEM TO AUDIT AND UPDATE AT LEAST ONE ELECTRONIC CONTROL UNIT OF A VEHICLE
CROSS REFERENCE TO RELATED APPLICTIONS
The present application claims priority from Indian Provisional Patent Application No. 202421024549 filed on 27/03/2024, the entirety of which is incorporated herein by a reference.
TECHNICAL FIELD
The present disclosure generally relates to vehicle control systems. Further, the present disclosure particularly relates to a system to audit and update at least one electronic control unit of a vehicle.
BACKGROUND
Vehicles incorporate electronic control units to manage various operational aspects, including engine performance, braking, transmission, and infotainment. Further, advancements in automotive technology have necessitated frequent updates to electronic control units to enhance efficiency, security, and compliance with regulatory standards. Various state-of-the-art systems and techniques have been developed to facilitate electronic control unit updates.
A commonly known technique involves manual updates performed at authorized service centers. Vehicle manufacturers or service technicians manually connect diagnostic tools to electronic control units to install software or firmware updates. However, such a technique is associated with several limitations. Frequent visits to service centers impose inconvenience on vehicle users, particularly in remote locations where access to authorized service centers is limited. Moreover, the manual update process increases the likelihood of human errors, leading to inconsistencies in software or firmware updates across vehicles. Furthermore, manual intervention in software or firmware updates introduces security vulnerabilities, as unauthorized personnel may gain access to vehicle software and introduce malicious modifications.
Another known technique involves over-the-air update mechanisms, wherein electronic control units receive software or firmware updates through wireless communication networks. Such a technique eliminates the need for physical access to vehicles, thereby reducing inconvenience for vehicle users. However, several drawbacks are associated with over-the-air update mechanisms. Wireless communication networks are susceptible to cyber threats, including unauthorized access, data interception, and transmission of malicious software. Further, failures in transmission due to network instability or interruptions may result in incomplete or corrupt updates, potentially affecting the functionality of electronic control units. Moreover, the absence of a robust validation mechanism increases the risk of unauthorized or erroneous updates, which may compromise vehicle performance and safety.
Other techniques rely on centralized update servers that distribute software or firmware updates to electronic control units over wired or wireless networks. Such centralized update servers store software or firmware updates, configuration data, and authentication parameters. However, such techniques are also associated with various limitations. The absence of secure authentication mechanisms increases the risk of unauthorized access to update servers, leading to potential data breaches. Further, improper verification of software or firmware updates may result in the installation of unverified or malicious updates, which may disrupt vehicle operations. Moreover, existing centralized update mechanisms often lack audit capabilities to track update history and validate the integrity of software or firmware modifications.
Various hybrid techniques integrate multiple update mechanisms to overcome individual limitations. Some hybrid techniques combine manual updates with over-the-air mechanisms, allowing vehicle users to choose preferred update methods. However, such hybrid techniques remain vulnerable to security threats, including unauthorized access, data manipulation, and transmission of unverified software or firmware. Further, hybrid techniques often lack a unified validation framework to assure the integrity and authenticity of updates.
In light of the above discussion, there exists an urgent need for solutions that overcome the problems associated with conventional systems and techniques for auditing and updating electronic control units of vehicles.
SUMMARY
The aim of the present disclosure is to provide a system to audit and update at least one electronic control unit (ECU) of a vehicle by securely transmitting, validating, and applying update packages while preventing unauthorized modifications, wherein the system affirms integrity, authentication, and controlled update deployment through a structured validation process.
In an aspect, the present disclosure provides a system to audit and update at least one ECU of a vehicle. The system comprises an update server operable to store, configure, and transmit update packages. The update server comprises a secure storage unit retaining configuration data associated with a plurality of vehicles and a package validation unit verifying update packages before transmission. A communication interface establishes a secure connection between the update server and at least one ECU to transmit update packages and receive audit data. A vehicle update manager disposed within the vehicle receives update packages and authenticates received update packages using a stored vehicle identifier and secure configuration data. A hashing unit computes a hash value based on a combination of the vehicle identifier and secure configuration data to validate integrity and prevent unauthorized modifications. A modification control unit modifies at least one ECU upon validation and updates software or firmware with a corresponding timestamp.
Furthermore, the update package comprises a cryptographic signature, a version identifier, a compatibility descriptor to validate compatibility with at least one electronic control unit, and an encrypted checksum generated by the update server to detect tampering during transmission. The system further comprises a configurator that constructs the update package with a timestamp, an installation flag, a priority level, a rollback prevention indicator, and an authorization token to enable sequencing of update packages. Moreover, the vehicle update manager logs rejected update attempts along with failure codes and timestamps for auditing purposes, wherein failure codes are categorized based on validation failures, transmission errors, and unauthorized modification attempts.
Additionally, the update validation process of at least one ECU comprises verifying the update package against a predefined update policy stored within a secure memory location. The predefined update policy defines security parameters, including an encryption type, an authentication method, and a version compatibility criterion. The vehicle update manager verifies the update package upon receipt by performing security routines, including validation of a header, a digital signature, and an encryption key. The update package is passed to at least one ECU only after confirming that the timestamp within the update package indicates a newer version than a currently installed version. Further, the vehicle update manager validates the update package by confirming that an electronic serial number associated with at least one ECU matches a stored electronic serial number.
Moreover, at least one ECU rebuilds an expected hash value using stored secure configuration data. A mismatch between the rebuilt hash value and a stored hash value indicates that at least one ECU is moved to a different vehicle or that configuration data is modified. The update server stores an audit log containing data on previously transmitted update packages, including timestamps, electronic serial numbers, vehicle identification numbers, and validation results.
In another aspect, the present disclosure provides a method to audit and update at least one ECU of a vehicle. The method comprises storing configuration data associated with a plurality of vehicles in a secure storage unit of an update server. Further, the method comprises verifying an update package using a package validation unit before transmission and transmitting the update package from the update server to at least one ECU through a communication interface. The method further comprises receiving the update package at a vehicle update manager disposed within the vehicle and authenticating the received update package using the vehicle update manager based on a stored vehicle identifier and secure configuration data. The method also comprises computing a hash value using a hashing unit based on a combination of the vehicle identifier and secure configuration data and validating integrity of the update package using the computed hash value. Furthermore, the method comprises modifying at least one ECU upon successful validation of the update package using a modification control unit and updating software or firmware associated with at least one ECU and storing a corresponding timestamp.
Additionally, the method comprises preventing repeated transmission of an identical update package to at least one ECU using a redundancy detection mechanism within the update server. The method further comprises restricting generation of the update package based on an authorization control mechanism within the update server that verifies vehicle ownership and authorized access credentials. Moreover, the method comprises logging a verification failure event within the vehicle update manager if an update package unmatched authentication or integrity validation criteria. Furthermore, the method comprises validating whether an update request originates from an authorized vehicle before transmitting an update package using a security enforcement mechanism within the update server.
BRIEF DESCRIPTION OF DRAWINGS
The summary above, as well as the following detailed description of illustrative embodiments, is better understood when read in conjunction with the appended drawings. For the purpose of illustrating the present disclosure, exemplary constructions of the disclosure are shown in the drawings. However, the present disclosure is not limited to specific methods and instrumentalities disclosed herein. Moreover, those in the art will understand that the drawings are not to scale. Wherever possible, like elements have been indicated by identical numbers.
Embodiments of the present disclosure will now be described, by way of example only, with reference to the following diagrams wherein:
FIG. 1 illustrates a system 100 to audit and update at least one electronic control unit (ECU) of a vehicle;
FIG. 2 illustrates a method 200 to audit and update at least one electronic control unit of the vehicle;
FIG. 3 illustrates a class diagram of the system 100 to audit and update at least one electronic control unit of the vehicle; and
FIG. 4 illustrates a sequence diagram of the system 100 to audit and update at least one electronic control unit of the vehicle.
In the accompanying drawings, an underlined number is employed to represent an item over which the underlined number is positioned or an item to which the underlined number is adjacent. A non-underlined number relates to an item identified by a line linking the non-underlined number to the item. When a number is non-underlined and accompanied by an associated arrow, the non-underlined number is used to identify a general item at which the arrow is pointing.
DETAILED DESCRIPTION
The following detailed description illustrates embodiments of the present disclosure and ways in which they can be implemented. Although some modes of carrying out the present disclosure have been disclosed, those skilled in the art would recognise that other embodiments for carrying out or practising the present disclosure are also possible.
The description set forth below in connection with the appended drawings is intended as a description of certain embodiments of a system to audit and update at least one electronic control unit (ECU) of a vehicle and is not intended to represent the only forms that may be developed or utilised. The description sets forth the various structures and/or functions in connection with the illustrated embodiments; however, it is to be understood that the disclosed embodiments are merely exemplary of the disclosure that may be embodied in various and alternative forms. The figures are not necessarily to scale; some features may be exaggerated or minimised to show details of particular components. Therefore, specific structural and functional details disclosed herein are not to be interpreted as limiting, but merely as a representative basis for teaching one skilled in the art to variously employ the present invention.
While the disclosure is susceptible to various modifications and alternative forms, specific embodiment thereof has been shown by way of example in the drawings and will be described in detail below. It should be understood, however, that it is not intended to limit the disclosure to the particular forms disclosed, but on the contrary, the disclosure is to cover all modifications, equivalents, and alternatives falling within the scope of the disclosure.
In the following detailed description of the embodiments of the disclosure, reference is made to the accompanying drawings, and which are shown by way of illustration specific embodiments in which the disclosure may be practiced. These embodiments are described in sufficient detail to enable those skilled in the art to practice the disclosure, and it is to be understood that other embodiments may be utilized and that changes may be made without departing from the scope of the present disclosure. The following description is, therefore, not to be taken in a limiting sense.
The present disclosure will be described herein below with reference to the accompanying drawings. In the following description, well known functions or constructions are not described in detail since they would obscure the description with unnecessary detail.
As used herein, the term "system" is used to refer to an arrangement of multiple interconnected components that collectively enable auditing and updating of at least one electronic control unit (ECU) of a vehicle. The system comprises a central processing entity, communication interfaces, security mechanisms, validation components, and control units to manage update processes. The system is deployed within a vehicle and across external computing environments, including remote update servers. The system handles the secure transmission, authentication, validation, and installation of update packages while maintaining compliance with predefined security policies. The system also includes mechanisms to log update history, track failed update attempts, and prevent unauthorized modifications. The system facilitates interaction between vehicle components and external infrastructure to enable consistency in software or firmware updates.
As used herein, the term "update server" is used to refer to a remote computing entity operable to store, configure, and transmit update packages for electronic control units of a vehicle. The update server comprises data repositories for maintaining configuration data associated with a plurality of vehicles. The update server initiates validation processes to assure that update packages meet predefined security and compatibility requirements before transmission. The update server generates cryptographic signatures, version identifiers, and integrity verification parameters to prevent unauthorized modifications. The update server establishes secure communication channels to interact with at least one ECU within a vehicle. The update server receives audit data from electronic control units to track update history and validation results. The update server prevents repeated transmission of identical update packages by employing redundancy detection mechanisms. The update server restricts the generation of update packages based on an authorization control mechanism verifying vehicle ownership and access credentials.
As used herein, the term "secure storage unit" is used to refer to a dedicated data repository within the update server that retains configuration data associated with a plurality of vehicles. The secure storage unit maintains encrypted records of vehicle identifiers, software versions, security keys, and authentication parameters. The secure storage unit prevents unauthorized access to stored data by implementing encryption and access control mechanisms. The secure storage unit makes sure that configuration data remains unchanged during storage and retrieval processes. The secure storage unit supports retrieval of historical records to track previous update activities for auditing purposes. The secure storage unit facilitates controlled access to authorized entities for generating and verifying update packages. The secure storage unit interacts with other components of the update server to validate configuration parameters before initiating an update transmission.
As used herein, the term "package validation unit" is used to refer to a component of the update server that verifies update packages before transmission to at least one electronic control unit. The package validation unit authenticates update packages by validating cryptographic signatures, verifying encryption keys, and enabling compliance with predefined security policies. The package validation unit performs integrity checks to detect tampering or unauthorized modifications in update packages. The package validation unit verifies compatibility descriptors within update packages to confirm compatibility with target electronic control units. The package validation unit assigns a validation status to each update package before authorizing transmission. The package validation unit prevents the distribution of unverified or compromised update packages that may impact vehicle functionality.
As used herein, the term "communication interface" is used to refer to a network-enabled entity operable to establish a secure connection between the update server and at least one electronic control unit. The communication interface enables bidirectional data exchange, allowing update packages to be transmitted to electronic control units and audit data to be received from electronic control units. The communication interface incorporates encryption mechanisms to protect transmitted data from interception and unauthorized access. The communication interface assures data integrity by detecting transmission errors and verifying message authenticity. The communication interface supports various communication protocols, including wired and wireless connections, to facilitate remote updates. The communication interface monitors transmission channels for disruptions and resumes update processes in case of failures. The communication interface interacts with the package validation unit to affirm that only verified update packages are transmitted. The communication interface prevents unauthorized entities from intercepting update packages by enforcing authentication measures during transmission.
As used herein, the term "vehicle update manager" is used to refer to a processing entity disposed within the vehicle and operable to receive update packages from the update server. The vehicle update manager authenticates received update packages by validating cryptographic signatures, verifying encryption keys, and cross-checking vehicle identifiers. The vehicle update manager logs rejected update attempts along with failure codes and timestamps for auditing purposes. The vehicle update manager categorizes failure codes based on validation failures, transmission errors, and unauthorized modification attempts. The vehicle update manager verifies update packages against predefined security policies stored within a secure memory location. The vehicle update manager executes security routines, including validation of headers, digital signatures, and encryption keys, before passing update packages to electronic control units. The vehicle update manager prevents unauthorized modifications by making sure that update packages are received only from trusted sources.
As used herein, the term "hashing unit" is used to refer to a processing entity operable to compute a hash value based on a combination of a vehicle identifier and secure configuration data. The hashing unit generates unique hash values that serve as integrity verification parameters for update packages. The hashing unit compares computed hash values with stored hash values to detect unauthorized modifications in update packages. The hashing unit prevents installation of tampered update packages by rejecting mismatched hash values. The hashing unit makes sure that update packages are applied only to electronic control units associated with verified vehicle identifiers. The hashing unit prevents unauthorized relocation of electronic control units by identifying discrepancies in configuration data
As used herein, the term "modification control unit" is used to refer to a processing entity operable to modify at least one ECU upon validation of an update package. The modification control unit updates software or firmware associated with electronic control units based on validated update packages. The modification control unit stores corresponding timestamps to track update history and enable audit processes. The modification control unit prevents unauthorized modifications by enforcing validation checks before applying updates. The modification control unit makes sure that updates are installed only after confirming integrity and authenticity.
FIG. 1 illustrates a system 100 to audit and update at least one electronic control unit (ECU) of a vehicle. The system 100 comprises an update server 102 that is operable to store, configure, and transmit update packages for at least one ECU of a vehicle. The update server 102 comprises multiple data repositories to store update packages, configuration data, and authentication parameters. The update server 102 generates update packages based on predefined update policies and security parameters. The update server 102 processes update requests by verifying vehicle identifiers, version compatibility, and security credentials before authorizing transmission. The update server 102 assigns a unique cryptographic signature to each update package to validate authenticity. The update server 102 implements an access control mechanism to restrict update package generation based on authorization credentials. The update server 102 stores historical records of transmitted update packages, including timestamps, electronic serial numbers, and validation results. The update server 102 interacts with external validation authorities to verify compliance with predefined security standards. The update server 102 transmits update packages through a secure communication channel to prevent unauthorized interception. The update server 102 comprises a secure storage unit 104 and a package validation unit 106 to enhance security and reliability of update transmissions.
In an embodiment, the secure storage unit 104 retains configuration data associated with a plurality of vehicles. The secure storage unit 104 maintains encrypted records of vehicle identifiers, software versions, and security credentials to prevent unauthorized access. The secure storage unit 104 retrieves stored configuration data to validate update package parameters before transmission. The secure storage unit 104 enables consistency in update processes by storing historical records of previously applied updates. The secure storage unit 104 interacts with the package validation unit 106 to authenticate update packages before authorization. The secure storage unit 104 restricts data access to authorized entities based on predefined access control policies. The secure storage unit 104 prevents unauthorized modifications by verifying cryptographic signatures associated with stored configuration data. The secure storage unit 104 enables secure retrieval and storage of audit logs related to update transmissions and validation results.
In an embodiment, the package validation unit 106 verifies update packages before transmission to at least one electronic control unit. The package validation unit 106 validates cryptographic signatures, encryption keys, and integrity verification parameters within update packages. The package validation unit 106 confirms compatibility descriptors to make sure update packages are compatible with target electronic control units. The package validation unit 106 assigns validation statuses to update packages based on security compliance checks. The package validation unit 106 prevents distribution of update packages that fail validation due to integrity violations or unauthorized modifications. The package validation unit 106 interacts with the secure storage unit 104 to retrieve configuration data for validation processes. The package validation unit 106 generates audit logs of validation results for tracking and security purposes. The package validation unit 106 prevents unauthorized modifications in update processes by enforcing security policies before authorizing transmission.
In an embodiment, the system 100 comprises a communication interface 108 that establishes a secure connection between the update server 102 and at least one electronic control unit. The communication interface 108 transmits update packages to at least one ECU while implementing encryption mechanisms to prevent data interception. The communication interface 108 receives audit data from at least one ECU to track update history and validation results. The communication interface 108 authenticates transmission requests before initiating data exchange to prevent unauthorized access. The communication interface 108 monitors transmission channels for disruptions and resumes update processes in case of failures. The communication interface 108 enforces access control policies to restrict update transmissions to authorized electronic control units. The communication interface 108 interacts with the package validation unit 106 to confirm that only verified update packages are transmitted. The communication interface 108 prevents unauthorized manipulation of update data by securing communication links between networked entities.
In an embodiment, the system 100 comprises a vehicle update manager 110 that is disposed within the vehicle and receives update packages from the update server 102. The vehicle update manager 110 authenticates received update packages by validating cryptographic signatures, encryption keys, and vehicle identifiers. The vehicle update manager 110 verifies update packages against predefined security policies stored within a secure memory location. The vehicle update manager 110 logs rejected update attempts along with failure codes and timestamps for auditing purposes. The vehicle update manager 110 categorizes failure codes based on validation failures, transmission errors, and unauthorized modification attempts. The vehicle update manager 110 executes security routines, including validation of headers, digital signatures, and encryption keys before passing update packages to at least one electronic control unit. The vehicle update manager 110 interacts with the update server 102 to retrieve configuration data for verification.
In an embodiment, the system 100 comprises a hashing unit 112 that computes a hash value based on a combination of a vehicle identifier and secure configuration data. The hashing unit 112 generates unique hash values for integrity verification of update packages before installation. The hashing unit 112 compares computed hash values with stored hash values to detect unauthorized modifications in update packages. The hashing unit 112 prevents installation of tampered update packages by rejecting mismatched hash values. The hashing unit 112 assures that update packages are applied only to electronic control units associated with verified vehicle identifiers. The hashing unit 112 prevents unauthorized relocation of electronic control units by identifying discrepancies in configuration data. The hashing unit 112 interacts with the vehicle update manager 110 to verify update integrity before installation. The hashing unit 112 prevents security breaches by detecting anomalies in update packages before applying modifications to at least one electronic control unit.
In an embodiment, the system 100 comprises a modification control unit 114 that modifies at least one ECU upon validation of an update package. The modification control unit 114 applies software or firmware updates to at least one ECU based on verified update packages. The modification control unit 114 stores corresponding timestamps to track update history and enable audit processes. The modification control unit 114 prevents unauthorized modifications by enforcing validation checks before applying updates. The modification control unit 114 makes sure that updates are installed only after confirming integrity and authenticity. The modification control unit 114 interacts with the hashing unit 112 to verify that computed hash values match expected values before proceeding with modifications. The modification control unit 114 prevents rollback to previous software versions if rollback prevention indicators are embedded within update packages. The modification control unit 114 enforces controlled installation of updates by verifying compatibility with predefined security parameters before applying modifications.
In an embodiment, the update package may comprise a cryptographic signature, a version identifier, a compatibility descriptor, and an encrypted checksum generated by an update server 102. The cryptographic signature authenticates the update package and verifies its source before transmission to at least one electronic control unit. The version identifier differentiates software or firmware iterations and prevents the installation of outdated or unauthorized updates. The compatibility descriptor defines parameters for assessing compatibility between the update package and at least one electronic control unit, making sure that only validated updates are applied. The encrypted checksum is generated by the update server 102 to detect tampering during transmission, preventing unauthorized modifications. The encrypted checksum is computed based on a combination of cryptographic keys and validation parameters, making sure that any modification to the update package results in checksum verification failure. The update package undergoes multiple verification steps before being transmitted to at least one electronic control unit, maintaining security and integrity throughout the process.
In an embodiment, a configurator may construct the update package with a timestamp, an installation flag, a priority level, a rollback prevention indicator, and an authorization token to enable sequencing of update packages. The timestamp records the time of package creation, making sure that only the most recent update is applied. The installation flag indicates whether the update package is mandatory or optional, directing the update process accordingly. The priority level determines the urgency of the update package, allowing the update server 102 to prioritize critical updates over non-critical ones. The rollback prevention indicator prevents unauthorized downgrades of software or firmware versions, maintaining compliance with security policies. The authorization token validates access credentials before allowing the installation of an update package, restricting unauthorized access.
In an embodiment, the vehicle update manager 110 may log rejected update attempts along with failure codes and timestamps for auditing purposes. The failure codes categorize reasons for rejection, including validation failures, transmission errors, and unauthorized modification attempts. Validation failures occur when an update package does not meet predefined security and compatibility criteria. Transmission errors include packet loss, incomplete data reception, or corrupted update files. Unauthorized modification attempts are detected when cryptographic signatures or hash values within the update package fail authentication checks. Each failed update attempt is recorded with a corresponding timestamp, allowing audit trails to track irregularities and security breaches. The vehicle update manager 110 communicates logged failure codes to an update server 102 for further analysis and potential corrective actions.
In an embodiment, an update validation process of at least one ECU may comprise verifying an update package against a predefined update policy stored within a secure memory location. The predefined update policy defines security parameters, including encryption type, authentication method, and version compatibility criteria. Encryption type specifies the cryptographic standard used to secure an update package, making sure that unauthorized modifications are detected. Authentication method defines validation steps required to verify the source and integrity of an update package before installation. Version compatibility criteria affirm that an update package is applicable to at least one ECU based on hardware and software configurations. The secure memory location prevents unauthorized modifications to the predefined update policy, maintaining consistency in security enforcement. The update validation process prevents the installation of unverified update packages that fail to meet security and compatibility requirements.
In an embodiment, the vehicle update manager 110 may verify an update package upon receipt by performing security routines, including validation of a header, a digital signature, and an encryption key. The update package is passed to at least one ECU only after confirming that a timestamp within the update package indicates a newer version than a currently installed version. The header validation makes sure that an update package conforms to formatting and transmission standards before processing. The digital signature verification authenticates an update package source and prevents unauthorized modifications. The encryption key validation decrypts an update package and verifies its integrity before installation. The timestamp comparison prevents rollback to previous software or firmware versions, assuring that an ECU only receives the latest updates. The vehicle update manager 110 enforces security protocols by rejecting update packages that do not pass validation checks.
In an embodiment, the vehicle update manager 110 may validate an update package by confirming that an electronic serial number associated with at least one ECU matches a stored electronic serial number. The electronic serial number serves as a unique identifier, linking an update package to a specific electronic control unit. If the electronic serial number within an update package does not match the stored electronic serial number, the vehicle update manager 110 rejects the update package. The validation process prevents unauthorized installations on unapproved electronic control units. The electronic serial number verification makes sure that an update package is applied only to the specific electronic control unit, reducing security risks associated with unauthorized installations.
In an embodiment, at least one ECU may rebuild an expected hash value using stored secure configuration data. A mismatch between a rebuilt hash value and a stored hash value indicates that at least one ECU has been moved to a different vehicle or that configuration data has been modified. The stored secure configuration data serves as a reference for computing an expected hash value. If a discrepancy is detected, the ECU prevents further processing of an update package until validation issues are resolved. The hash value comparison maintains system integrity by detecting unauthorized modifications to configuration data.
In an embodiment, the update server 102 may store audit log containing data on previously transmitted update packages, including timestamps, electronic serial numbers, vehicle identification numbers, and validation results. The audit log records each update package transmission event, enabling traceability of update history. Timestamps provide chronological records of update activities, while electronic serial numbers and vehicle identification numbers associate updates with specific electronic control units. Validation results indicate whether update packages passed security and compatibility checks before installation. The audit log supports security enforcement by maintaining a record of all update activities.
FIG. 2 illustrates a method 200 to audit and update at least one electronic control unit (ECU) of the vehicle. The method 200 begins at step 202, where configuration data associated with multiple vehicles is stored in a secure storage unit. In step 204, an update package is verified using a package validation unit to enable compliance with security policies. Once verified, the update package is transmitted in step 206 from an update server to at least one ECU via a communication interface. The update package is received at step 208 by a vehicle update manager, which then proceeds to authenticate the package in step 210 using a stored vehicle identifier and secure configuration data. Following authentication, a hashing unit computes a hash value at step 212 to validate update integrity. If the hash value confirms authenticity, the process moves to step 214, where integrity validation is completed. Upon successful validation, at step 216, a modification control unit applies the update to at least one electronic control unit. Finally, in step 218, the system updates the software or firmware and stores a corresponding timestamp to maintain an audit record.
In an embodiment, a redundancy detection mechanism within the update server 102 may prevent repeated transmission of an identical update package to at least one ECU that has already received the update package. The redundancy detection mechanism verifies update package identifiers and transmission history before initiating a new update request. The redundancy detection mechanism retrieves stored records of previously transmitted update packages and compares them with an incoming update request. If an update package identifier matches an entry in the stored records, the redundancy detection mechanism prevents retransmission, reducing network congestion and preventing unnecessary processing by at least one electronic control unit. The redundancy detection mechanism makes sure that an update package is only transmitted when a newer version is available, thereby preventing redundant installations. The redundancy detection mechanism interacts with an audit log stored within the update server 102 to track previously executed update operations and identify duplicate update requests.
In an embodiment, an authorization control mechanism within the update server 102 may restrict the generation of an update package based on verification of vehicle ownership and authorized access credentials. The authorization control mechanism validates access requests from external entities before permitting update package creation. The authorization control mechanism retrieves ownership records from a secure storage unit 104 and cross-references them with access credentials provided by a requestor. The authorization control mechanism verifies that a requestor is authorized to generate update packages for a specific vehicle before proceeding with update package configuration. The authorization control mechanism prevents unauthorized entities from initiating update requests by enforcing predefined access control policies. The authorization control mechanism logs each update package generation event within an audit log stored in the update server 102, maintaining a record of access requests and authentication results.
In an embodiment, the vehicle update manager 110 may log a verification failure event if an update package does not meet authentication or integrity validation criteria. The verification failure event includes details regarding the nature of the failure, timestamp of the failed validation attempt, and identification parameters associated with the affected electronic control unit. The vehicle update manager 110 categorizes verification failure events based on predefined failure types, including authentication errors, checksum mismatches, cryptographic signature verification failures, and unauthorized modification attempts. The vehicle update manager 110 transmits verification failure event logs to an update server 102 for analysis and corrective actions. The verification failure event log provides an audit trail for tracking update validation failures and identifying potential security threats. The vehicle update manager 110 interacts with a hashing unit 112 and a package validation unit 106 to detect discrepancies in update packages before installation.
In an embodiment, a security enforcement mechanism within the update server 102 may validate whether an update request originates from an authorized vehicle before transmitting an update package. The security enforcement mechanism verifies authentication credentials of an update requestor before initiating data transmission. The security enforcement mechanism retrieves stored authentication parameters, including vehicle identification numbers, cryptographic signatures, and authorization tokens, and cross-references them with details provided in the update request. The security enforcement mechanism prevents unauthorized entities from receiving update packages by enforcing predefined security policies. The security enforcement mechanism interacts with a communication interface 108 to make sure that update packages are only transmitted through secure communication channels. The security enforcement mechanism generates an audit entry within an update server 102 to document authentication results for each processed update request. The security enforcement mechanism prevents unauthorized access to update packages and maintains system integrity by restricting update transmissions to verified vehicles.
In an embodiment, a system 100 audits and updates at least one ECU of a vehicle by securely transmitting, validating, and applying update packages. An update server 102 stores, configures, and transmits update packages while maintaining configuration data associated with multiple vehicles. A secure storage unit 104 retains encrypted configuration data to prevent unauthorized access or tampering. A package validation unit 106 verifies update packages before transmission, enabling compliance with security policies and compatibility requirements. A communication interface 108 establishes a secure connection between the update server 102 and at least one electronic control unit, allowing bidirectional data exchange for transmitting update packages and receiving audit data. A vehicle update manager 110 authenticates received update packages using a stored vehicle identifier and secure configuration data before authorizing installation. A hashing unit 112 computes a hash value based on the vehicle identifier and configuration data, assuring update integrity by detecting unauthorized modifications. A modification control unit 114 modifies at least one ECU by applying validated updates and storing a corresponding timestamp to track update history.
In an embodiment, an update package comprises a cryptographic signature, a version identifier, a compatibility descriptor, and an encrypted checksum to enhance security and enable proper update installation. The cryptographic signature verifies the authenticity of the update package by confirming its origin before transmission. The version identifier differentiates software or firmware iterations, preventing outdated updates from being installed. The compatibility descriptor defines hardware and software compatibility parameters to assure that the update package is applicable to at least one electronic control unit. The encrypted checksum, generated by an update server 102, detects any tampering during transmission by verifying data integrity before applying updates
In an embodiment, a configurator constructs an update package by incorporating a timestamp, an installation flag, a priority level, a rollback prevention indicator, and an authorization token to facilitate update sequencing. The timestamp records the creation time of the update package, making sure that only the most recent updates are installed. The installation flag designates whether the update package is mandatory or optional, determining whether immediate installation is required. The priority level assigns a level of urgency to the update package, allowing an update server 102 to prioritize critical updates. The rollback prevention indicator prevents unauthorized downgrades, making sure that electronic control units remain updated with secure versions. The authorization token authenticates the entity generating the update package, restricting unauthorized update package creation and transmission. The configurator enables structured update deployment by incorporating security parameters and update management controls within the update package.
In an embodiment, a vehicle update manager 110 logs rejected update attempts along with failure codes and timestamps for auditing purposes. The failure codes categorize rejection reasons into validation failures, transmission errors, and unauthorized modification attempts. Validation failures occur when an update package does not comply with predefined security policies or compatibility requirements. Transmission errors result from network disruptions, incomplete data reception, or corrupted files, preventing successful installation. Unauthorized modification attempts involve detected tampering with cryptographic signatures, hash values, or authentication tokens, leading to rejection. Each rejected update attempt is logged with a corresponding timestamp, assuring auditability and tracking of anomalies. A vehicle update manager 110 transmits rejection logs to an update server 102 for further analysis, enabling security monitoring and corrective actions.
In an embodiment, an update validation process verifies an update package against a predefined update policy stored within a secure memory location. The predefined update policy defines security parameters, including encryption type, authentication method, and version compatibility criteria, making sure that only verified updates are installed. Encryption type specifies cryptographic standards used to secure update packages, preventing unauthorized access or tampering. Authentication method outlines validation steps required to verify the source and integrity of the update package. Version compatibility criteria assures that an update package aligns with at least hardware and software configurations of one electronic control unit, preventing incompatible installations. The secure memory location protects the predefined update policy from unauthorized modifications, assuring that security parameters remain consistent. The update validation process enforces security controls by rejecting update packages that fail to meet encryption, authentication, or compatibility requirements.
In an embodiment, a vehicle update manager 110 verifies an update package upon receipt by performing security routines, including validation of a header, a digital signature, and an encryption key. A header validation makes sure that an update package meets format and transmission standards before processing. A digital signature verification confirms the authenticity of the update package source and detects unauthorized modifications. An encryption key validation decrypts an update package and verifies its integrity before installation. A vehicle update manager 110 compares a timestamp within an update package to the timestamp of a currently installed version to prevent rollback to older versions. The update package is only passed to at least one ECU if all security validations are successfully completed.
In an embodiment, a vehicle update manager 110 validates an update package by confirming that an electronic serial number associated with at least one ECU matches a stored electronic serial number. The electronic serial number serves as a unique identifier, assuring that the update package is applied only to the intended electronic control unit. If the electronic serial number in an update package does not match the stored electronic serial number, a vehicle update manager 110 rejects the update package, preventing unauthorized installations.
In an embodiment, at least one ECU rebuilds an expected hash value using stored secure configuration data. A mismatch between a rebuilt hash value and a stored hash value indicates that at least one ECU has been moved to a different vehicle or that configuration data has been modified. The stored secure configuration data serves as a reference for computing an expected hash value. If a discrepancy is detected, at least one ECU halts update processing until validation issues are resolved. The hash value comparison maintains update security by preventing unauthorized modifications or unauthorized use of an electronic control unit.
In an embodiment, an update server 102 stores an audit log containing data on previously transmitted update packages, including timestamps, electronic serial numbers, vehicle identification numbers, and validation results. The audit log records update history, providing traceability for software or firmware modifications applied to at least one electronic control unit. Timestamps document when updates were installed, while electronic serial numbers and vehicle identification numbers associate update packages with specific electronic control units. Validation results indicate whether an update package passed security checks before installation, enabling compliance with security policies. The audit log supports security enforcement and facilitates forensic analysis in case of unauthorized update attempts.
In an embodiment, a method 200 audits and updates at least one ECU of a vehicle by executing multiple security validation steps before modifying system software or firmware. The method 200 includes storing configuration data in a secure storage unit 104, verifying an update package using a package validation unit 106, and transmitting an update package through a communication interface 108. The method 200 further includes receiving an update package at a vehicle update manager 110, authenticating the received update package using stored vehicle identifiers and secure configuration data, and computing a hash value using a hashing unit 112. The method 200 validates update integrity before modifying at least one ECU using a modification control unit 114. The method 200 concludes by updating software or firmware and storing a corresponding timestamp.
In an embodiment, a redundancy detection mechanism within an update server 102 prevents repeated transmission of an identical update package to at least one ECU that has already received the update package. The redundancy detection mechanism retrieves update records from a secure storage unit 104 and compares the update package identifier against previously transmitted update packages. If an identical update package has already been sent and successfully installed, the redundancy detection mechanism blocks retransmission, preventing unnecessary data transmission and reducing bandwidth consumption. The redundancy detection mechanism affirms that only required updates are delivered, optimizing network resources and preventing processing overload on at least one electronic control unit. The redundancy detection mechanism interacts with a vehicle update manager 110 to verify the current software or firmware version installed on at least one ECU before authorizing a new transmission. If an update package version is already applied, the redundancy detection mechanism restricts further updates, assuring that only newer versions are transmitted.
In an embodiment, an authorization control mechanism within an update server 102 restricts the generation of an update package based on verification of vehicle ownership and authorized access credentials. The authorization control mechanism retrieves ownership records stored in a secure storage unit 104 and cross-checks provided credentials before permitting update package generation. The authorization control mechanism validates whether a requestor has the necessary permissions to initiate an update, preventing unauthorized individuals from generating update packages. If access credentials do not match stored authorization records, the authorization control mechanism rejects the request, restricting update package creation. The authorization control mechanism prevents unauthorized access to vehicle update systems, mitigating security risks associated with unverified updates. The authorization control mechanism interacts with a package validation unit 106 to affirm that generated update packages comply with predefined security policies before transmission. The authorization control mechanism logs each update generation request along with authentication results, maintaining traceability of access attempts.
In an embodiment, a vehicle update manager 110 logs a verification failure event if an update package does not match authentication or integrity validation criteria. The verification failure event includes timestamped records detailing the reason for rejection, such as authentication failure, cryptographic signature mismatch, checksum error, or unauthorized modification attempt. The vehicle update manager 110 categorizes failure events into predefined error types to assist in security analysis and troubleshooting. Authentication failures occur when an update package source does not match expected credentials. Cryptographic signature mismatches indicate potential tampering or corruption during transmission. Checksum errors result from data integrity issues, preventing incomplete or altered update packages from being applied. Unauthorized modification attempts are detected when an update package contains unauthorized changes to vehicle configuration parameters. The vehicle update manager 110 communicates failure event logs to an update server 102 for further investigation and security monitoring. Logged failure events provide an audit trail for identifying vulnerabilities and unauthorized update attempts.
In an embodiment, a security enforcement mechanism within an update server 102 validates whether an update request originates from an authorized vehicle before transmitting an update package. The security enforcement mechanism retrieves authentication credentials from a secure storage unit 104 and cross-references them with update request details. The security enforcement mechanism verifies vehicle identification numbers, electronic serial numbers, cryptographic signatures, and authorization tokens before allowing update transmission. If authentication details do not match stored records, the security enforcement mechanism rejects the update request, preventing unauthorized access. The security enforcement mechanism interacts with a communication interface 108 to assure that update transmissions are routed through secure channels, mitigating risks associated with interception or spoofing. The security enforcement mechanism logs authentication results in an audit log maintained within an update server 102, tracking all update requests for security monitoring.
FIG. 3 illustrates a class diagram of the system 100 to audit and update at least one electronic control unit (ECU) of the vehicle. An update server 102 stores, configures, and transmits update packages while interacting with a secure storage unit 104, which retains configuration data, and a package validation unit 106, which verifies update packages before transmission. A communication interface 108 establishes a secure connection and transmits update packages to a vehicle update manager 110, which receives and authenticates update packages. The vehicle update manager 110 interacts with a hashing unit 112 to compute a hash value and validate update integrity before forwarding validated updates to a modification control unit 114. The modification control unit 114 modifies at least one ECU by updating software or firmware and storing a timestamp.
FIG. 4 illustrates a sequence diagram of the system 100 to audit and update at least one electronic control unit (ECU) of the vehicle. The process begins with an update server 102 transmitting an update package to a communication interface 108, which establishes a secure connection and delivers the update package to a vehicle update manager 110. The vehicle update manager 110 then forwards the received update package to a hashing unit 112, which computes a hash value to verify the integrity of the update package. Upon successful verification, the hashing unit 112 returns the integrity validation result to the vehicle update manager 110. If the update package is validated, the vehicle update manager 110 sends an approval request to a modification control unit 114, which is responsible for applying the update. Once approved, the modification control unit 114 transmits the validated update package to at least one electronic control unit, where the update is applied. The update process concludes once the ECU is successfully updated, making sure secure and verified modifications.
In the description of the present invention, it is also to be noted that, unless otherwise explicitly specified or limited, the terms “disposed,” “mounted,” and “connected” are to be construed broadly, and may for example be fixedly connected, detachably connected, or integrally connected, either mechanically or electrically. They may be connected directly or indirectly through intervening media, or they may be interconnected between two elements. The specific meaning of the above terms in the present invention can be understood in specific cases to those skilled in the art.
Modifications to embodiments and combination of different embodiments of the present disclosure described in the foregoing are possible without departing from the scope of the present disclosure as defined by the accompanying claims. Expressions such as “comprising”, “comprising”, “incorporating”, “have”, “is” used to describe and claim the present disclosure are intended to be construed in a non- exclusive manner, namely allowing for items, components or elements not explicitly described also to be present. Reference to the singular is also to be construed to relate to the plural where appropriate.
Although embodiments have been described with reference to a number of illustrative embodiments thereof, it should be understood that numerous other modifications and embodiments can be devised by those skilled in the art that will fall within the spirit and scope of the principles of this disclosure. More particularly, various variations and modifications are possible in the component parts and/or arrangements of the subject combination arrangement within the scope of the present disclosure, the drawings and the appended claims. In addition to variations and modifications in the component parts and/or arrangements, alternative uses will also be apparent to those skilled in the art.
,CLAIMS:WE CLAIM:
1. A system 100 to audit and update at least one electronic control unit (ECU) of a vehicle, the system 100 comprising:
an update server 102 operable to store, configure, and transmit the update packages, wherein the update server 102 comprises:
a secure storage unit 104 for retaining configuration data associated with a plurality of vehicles; and
a package validation unit 106 for verifying the update packages prior to transmission;
a communication interface 108 operable to establish a secure connection between the update server 102 and the at least one ECU, wherein the communication interface 108 transmits the update packages to the at least one ECU and receives audit data from the at least one ECU;
a vehicle update manager 110 disposed within the vehicle and operable to receive the update packages from the update server 102, wherein the vehicle update manager 110 is configured to authenticate the received update package using a stored vehicle identifier (VID) and secure configuration data;
a hashing unit 112 operable to compute a hash value based on a combination of the VID and the secure configuration data, wherein the hashing unit 112 validates integrity of the update package and prevents the unauthorized modifications;
a modification control unit 114 operable to modify the at least one ECU upon validation of the update package, wherein the modification control unit 114 updates software or firmware associated with the at least one ECU and stores a corresponding timestamp.
2. The system 100 of claim 1, wherein the update package comprises:
a cryptographic signature, a version identifier, a compatibility descriptor to validate compatibility with the at least one ECU; and
an encrypted checksum generated by the update server 102 to detect tampering during transmission.
3. The system 100 of claim 1, further comprises a configurator that constructs the update package with the timestamp, an installation flag, a priority level, a rollback prevention indicator, and an authorization token to enable sequencing of the update packages.
4. The system 100 of claim 1, wherein the vehicle update manager 110 logs the rejected update attempts along with the failure codes and the timestamps for auditing purposes, wherein the failure codes are categorized based on the validation failures, the transmission errors, and the unauthorized modification attempts.
5. The system 100 of claim 1, wherein update validation process of the at least one ECU comprises verifying the update package against a predefined update policy stored within a secure memory location, wherein the predefined update policy defines the security parameters, including an encryption type, an authentication method, and a version compatibility criterion.
6. The system 100 of claim 1, wherein the vehicle update manager 110 verifies the update package upon receipt by performing the security routines, including validation of a header, a digital signature, and an encryption key, wherein the update package is passed to the at least one ECU only after confirming that the timestamp within the update package indicates a newer version than a currently installed version.
7. The system 100 of claim 1, wherein the vehicle update manager 110 validates the update package by confirming that an electronic serial number associated with the at least one ECU matches a stored electronic serial number.
8. The system 100 of claim 1, wherein the at least one ECU rebuilds an expected hash value using stored secure configuration data, wherein a mismatch between the rebuilt hash value and a stored hash value indicates that the at least one ECU is moved to a different vehicle or that the configuration data is modified.
9. The system 100 of claim 1, wherein the update server 102 stores an audit log containing data on the previously transmitted update packages, including the timestamps, the electronic serial numbers, the vehicle identification numbers, and the validation results.
10. A method 200 to audit and update at least one electronic control unit (ECU) of a vehicle, the method 200 comprising:
storing configuration data associated with a plurality of vehicles in a secure storage unit 104 of an update server 102;
verifying an update package using a package validation unit 106 prior to transmission;
transmitting the update package from the update server 102 to at least one ECU through a communication interface 108;
receiving the update package at a vehicle update manager 110 disposed within the vehicle;
authenticating the received update package using the vehicle update manager 110 based on a stored vehicle identifier and secure configuration data;
computing a hash value using a hashing unit 112 based on a combination of the vehicle identifier and the secure configuration data;
validating integrity of the update package using the computed hash value;
modifying the at least one ECU upon successful validation of the update package using a modification control unit 114; and
updating software or firmware associated with the at least one ECU and storing a corresponding timestamp.
11. The method 200 of claim 10, further comprising preventing repeated transmission of an identical update package to the at least one ECU is already received the update package using a redundancy detection mechanism within the update server 102.
12. The method 200 of claim 10, further comprising restricting generation of the update package based on an authorization control mechanism within the update server 102 that verifies vehicle ownership and the authorized access credentials.
13. The method 200 of claim 10, further comprising logging a verification failure event within the vehicle update manager 110, if an update package unmatched authentication or integrity validation criteria.
14. The method 200 of claim 10, further comprising validating whether an update request originates from an authorized vehicle, before transmitting an update package using a security enforcement mechanism within the update server 102.

Documents

Application Documents

# Name Date
1 202421024549-PROVISIONAL SPECIFICATION [27-03-2024(online)].pdf 2024-03-27
2 202421024549-POWER OF AUTHORITY [27-03-2024(online)].pdf 2024-03-27
3 202421024549-FORM FOR SMALL ENTITY(FORM-28) [27-03-2024(online)].pdf 2024-03-27
4 202421024549-FORM 1 [27-03-2024(online)].pdf 2024-03-27
5 202421024549-EVIDENCE FOR REGISTRATION UNDER SSI(FORM-28) [27-03-2024(online)].pdf 2024-03-27
6 202421024549-DRAWINGS [27-03-2024(online)].pdf 2024-03-27
7 202421024549-FORM-5 [18-03-2025(online)].pdf 2025-03-18
8 202421024549-DRAWING [18-03-2025(online)].pdf 2025-03-18
9 202421024549-COMPLETE SPECIFICATION [18-03-2025(online)].pdf 2025-03-18
10 202421024549-FORM-9 [24-03-2025(online)].pdf 2025-03-24
11 202421024549-Proof of Right [17-04-2025(online)].pdf 2025-04-17