The patent badge is an abbreviated version of the USPTO patent document. The patent badge does contain a link to the full patent document.

The patent badge is an abbreviated version of the USPTO patent document. The patent badge covers the following: Patent number, Date patent was issued, Date patent was filed, Title of the patent, Applicant, Inventor, Assignee, Attorney firm, Primary examiner, Assistant examiner, CPCs, and Abstract. The patent badge does contain a link to the full patent document (in Adobe Acrobat format, aka pdf). To download or print any patent click here.

Date of Patent:
Sep. 24, 2024

Filed:

Jun. 07, 2019
Applicant:

Nvidia Corporation, San Jose, CA (US);

Inventors:

Mark Overby, Bothel, WA (US);

Rick Dingle, Bleadon, GB;

Nicola Di Miscio, Ely, GB;

Varadharajan Kannan, Bristol, GB;

Yong Zhang, Hampshire, GB;

Francesco Saracino, Kenynsham, GB;

Assignee:

NVIDIA Corporation, Santa Clara, CA (US);

Attorney:
Primary Examiner:
Assistant Examiner:
Int. Cl.
CPC ...
H04L 29/06 (2006.01); G06F 9/455 (2018.01); G06F 13/40 (2006.01); G06N 20/00 (2019.01); H04L 9/32 (2006.01); H04L 9/40 (2022.01); H04L 12/40 (2006.01); H04L 47/24 (2022.01); H04L 61/2585 (2022.01); G06F 21/60 (2013.01); H04L 9/00 (2022.01); H04L 67/12 (2022.01);
U.S. Cl.
CPC ...
H04L 63/1416 (2013.01); G06F 9/45558 (2013.01); G06F 13/4068 (2013.01); G06N 20/00 (2019.01); H04L 9/3265 (2013.01); H04L 12/40 (2013.01); H04L 12/40013 (2013.01); H04L 47/24 (2013.01); H04L 61/2585 (2013.01); H04L 63/1425 (2013.01); H04L 63/1441 (2013.01); G06F 2009/45587 (2013.01); G06F 2009/45595 (2013.01); G06F 21/602 (2013.01); H04L 9/50 (2022.05); H04L 2012/40215 (2013.01); H04L 2012/40273 (2013.01); H04L 63/1458 (2013.01); H04L 63/166 (2013.01); H04L 67/12 (2013.01);
Abstract

Various approaches are disclosed for protecting vehicle buses from cyber-attacks. Disclosed approaches provide for an embedded system having a hypervisor that provides a virtualized environment supporting any number of guest OSes. The virtualized environment may include a security engine on an internal communication channel between the guest OS and an external vehicle bus of a vehicle to analyze network traffic to protect the guest OS from other guest OSes or other network components, and to protect those network components from the guest OS. Each guest OS may have its own security engine customized for the guest OS to account for what is typical or expected traffic for the guest OS (e.g., using machine learning, anomaly detection, etc.). Also disclosed are approaches for corrupting a message being transmitted on a vehicle bus to prevent devices from acting on the message.


Find Patent Forward Citations

Loading…