This invention relates generally to electric vehicles, and more particularly to electric vehicles with a plurality of private keys and private key pairs to cryptographically secure sensitive information relative to the electric vehicle.
Numerous proposals have presented for providing wireless communications between vehicles and between a vehicle and roadside units. Examples of such proposals include the IEEE 1609 set of standards for wireless access in vehicle environments (WAVE) and the ETSI standards for intelligent transport systems. In these systems, the communications may help to enhance the safety of the vehicles, provide additional information and provide additional services. For example, the communications may help to avoid collisions, provide collision warnings, enhance traffic flow, provide navigation and route guidance, provide point of interest information and provide remote diagnostics. Numerous other uses of these communications have been proposed as well.
In one method credentials are stored in credential files in a storage in a vehicle. Each credential specifies a private signing key and a digital certificate. The digital certificate is valid for a specified time frame. The credential files are named to contain information regarding the specified time frame in which the credentials in the credential files are valid. A sorted index to the credential files is stored in the storage of the vehicle. The index indexes the credential files by the time frames. The index is used to retrieve the credential files for a duration wherein the credentials in the retrieved credential files are valid. One or more of the retrieved credential files may then be used in the vehicle communication system during the duration.
In another method a local certificate manager is started and upon starting the local certificate manager, a check is made whether enough private keys for a specified period have been rederived. If enough private keys have been rederived, at least some of the rederived private keys are stored in a nonvolatile storage in a vehicle. If not, enough private keys have been rederived, additional private keys are rederived and store in the non-volatile memory in the vehicle. At least one of the private keys is used in securing a communication in the secure vehicle communication system during the specified time period.
In accordance with a further exemplary embodiment, a user request to change identity is received in a secure vehicle communication system. In response to the user request, an indication is provided to the user that certificates are available for selection to realize the identity change. A selection is received from the user. A certificate identifier for the selected one of the certificates is returned to the user and a selected one of the certificates is used for the communication in a secure vehicle communication system.
An object of the present invention is to provide improved electric vehicles.
A further object of the present invention is to provide electric vehicles with a plurality of private keys and private key pairs to cryptographically secure sensitive information relative to the electric vehicle,
Yet another object of the present invention is to provide electric vehicles with private keys used to perform one or more of: decryption; encryption: or signing data, and a corresponding public key used to decrypt or verify a signature of the data signed by its private key, wherein public keys cannot be used to encrypt or sign data.
Still another object of the present invention is to provide electric vehicles couple to a cloud, where the cloud provides securely storing and generation of public key and private key pairs.
A further object of the present invention is to provide an electric vehicle that includes a plurality of hardware components.
Another object of the present invention is to provide an electric with a plurality of hardware components, each storing a public key.
Still another object of the present invention is to provide an electric vehicle with hardware components where secure encryption is not put on a hardware component.
A further object of the present invention is to provide an electric vehicle, wherein when the electric vehicle is activated a first time, a unique public key and private key pair are generated by the cloud.
Yet another object of the present invention is to provide an electric vehicle where public keys are passed to hardware components, and private keys are stored in the cloud.
Still a further object of the present invention is to provide an electric vehicle where an activation message is generated.
A further object of the present invention is to provide an electric vehicle wherein when an activation message is received by the electric vehicle individual hardware components decrypt and verify their parts of the message.
Yet another object of the present invention is to provide an electric vehicle that receives an activation message, and if any one component's message part fails verification, then the electric vehicle does not activate.
These and other objects of the present invention are achieved in, an electric vehicle. A cloud is coupled to and in communication with the electric vehicle. The cloud includes a server. A plurality of private keys and private key pairs cryptographically secure sensitive information relative to the electric vehicle. The private keys perform one or more of: decryption; encryption: or signing data. A corresponding public key decrypts or verifies a signature of the data signed by its private key Public keys cannot be used to encrypt or sign data.
Embodiments of the described technology provide electric scooters having top-swappable batteries. The batteries may be attached to the underside of the deck of the scooter to form a removable deck assembly. The deck assembly may be removed from the top of the scooter by operating a latch and lifting a handle of the assembly. The deck assembly may be returned to the scooter in a similar manner.
In some embodiments, the battery may be electrically coupled to a motor of the scooter by electrical cables and an electrical connector. The electrical connector may be a quick twist connector that is opened and closed by twisting its halves in opposite directions.
In some embodiments, instead of using electrical cables, the scooter and deck assembly may include electrical connectors that mate when the deck assembly is installed in the scooter. The electrical connectors may be surrounded by cushions that protect the connectors from micro vibrations, dirt and water, and the like.
The electric scooter 100 is depicted in
In the depicted embodiment, the lock assembly 308 is implemented as a physical lock, to be used with a physical key. But in other embodiments, the lock assembly 308 may be implemented in other ways. For example, the lock assembly 308 may be an electronic lock, which may be operated using an electronic key, fob, remote control, or the like. In embodiments where security is not required, the lock in the lock assembly 308 may be replaced with a knob, a button, or another mechanism. In any case, the lock assembly 308 may be hidden or disguised. This feature is especially useful in a ridesharing fleet, where users should not operate the lock assembly 308, or remove the deck assembly 102.
Also visible in
Other advantages are especially applicable to a fleet of shareable electric scooters. In current fleets, the scooters are generally collected each evening, and taken to a charging facility where the batteries are charged. The charged scooters are then returned to scooter sharing locations the next morning. But in this arrangement, the scooters are unavailable for sharing while being charged. And this arrangement requires two trips per day: one trip to collect the scooters, and another trip to deploy them.
Embodiments of the disclosed technology solve both of these problems. With the disclosed removable deck assembly, the scooters need not be collected. Instead, only the deck assemblies may be collected. The scooters may be left in the sharing location, sharing racks, and the like. Furthermore, with a fleet of similar scooters, the deck assemblies are interchangeable. Therefore, an operator can replace a discharged battery pack with a fresh battery pack, requiring only one trip, and keeping the scooter available while the discharged battery pack is recharged. And because the disclosed deck assemblies are much smaller than the scooters, many more scooters can be serviced by a single truck than with current arrangements. In addition, because the disclosed deck assemblies weigh less than the scooter, there is less likelihood an operator will be injured while lifting them.
In some embodiments, one half of the soft connector may include a locking indicator 814. The locking indicator 814 may shine red until the soft connector is completely closed, whereupon the indicator 814 may switch to green to indicate a positive lock of the soft connector.
One advantage of the disclosed quick twist electrical soft connector is that it mitigates the problem of micro vibrations. Vehicles such as automobiles and bicycles are subject to vibrations caused by imperfections in the road surface. Vehicles with small, hard wheels, such scooters, are subject to these vibrations, and also to micro vibrations, which are caused by tiny imperfections in the road surface, for example such as the pebbles in a conglomerate road surface. Electrical connectors in particular are adversely affected by micro vibrations, which cause the mating electrical parts to rub together and thereby deteriorate. Gold plating on electrical connectors is particularly subject to this deterioration. In the disclosed embodiments, the lengths of electrical cables 806, 808 isolate the electrical connector from these micro vibrations, greatly reducing any wear the electrical connectors 812 experience.
Another advantage of the disclosed quick twist electrical soft connector is that it encourages users not to pull on the cables 806, 808 to open the soft connector. In conventional electrical connectors with no twist lock mechanism, users may be tempted to pull on the cables to open the connector. This abuse may shorten the life of the electrical cable and electrical connector considerably. But this is not possible with the twist connector. The user must grasp the soft connector halves in order to twist them in opposite directions. Consequently, the electrical soft connector and electrical cables 806, 808 may enjoy a longer lifespan.
But in other embodiments, an elastic mounting block may be disposed on the deck assembly 902 instead, or as well. For example, as shown in
Referring again to
In some embodiments, the electric lock 1008 may operate in parallel with the mechanical lock 1002. In such embodiments, the electric lock 1008 may insert the tab 1014 into a notch in the deck assembly. In such embodiments, both locks 1002, 1008 must be opened to release the deck assembly.
In some embodiments, the tab 1014 of the electrical lock 1008 may have multiple stops. In one of the stops, the tab 1014 engages the latch 1006 of the mechanical lock 1002, thereby preventing its operation, as illustrated in
In embodiments that include an electrical power cable, the scooter may include a mechanism to retain and protect the cable when the deck assembly is installed.
When the deck assembly 102 is installed in the frame 104 of the scooter 100, the retention device 1102 retracts, guides, organizes, and stores the loose portions of the electrical cables 806, 808, as shown in
In some embodiments, the latch that retains the deck assembly 102 within the frame 104 of the scooter 100 may be hidden within a structure such as the frame 104 or the housing 110 of the scooter 100 so that it cannot be seen, and to protect the latch from damage. One such embodiment is illustrated in
Referring to
Referring to
Referring to
In one embodiment, illustrated in
Private keys and private key pairs (collectively 1512 and 1514) are used to cryptographically secure sensitive information. private keys 1512 can be used to decrypt, encrypt, or sign data. the corresponding public key 1514 can be used to decrypt or verify the signature of the data signed by its private key. public keys cannot be used to encrypt or sign data.
As a non-limited example, as used herein a vehicle 1516 is a means of carrying or transporting something including but not limited to an EV motor vehicle 1516, including but not limited to a scooter, skateboard, skates, and the like.
As used herein an encryption key is a piece of information that determines the functional output of a cryptographic algorithm. For encryption algorithms, a key specifies the transformation of plaintext into ciphertext, and vice versa for decryption algorithms. Keys also specify transformations in other cryptographic algorithms, such as digital signature schemes and message authentication codes.
As used herein, the cloud 1518 is a global network of servers, each with a unique function. The is not a physical entity, but instead is a vast network of remote servers around the globe which are hooked together and meant to operate as a single ecosystem. These servers are designed to either store and manage data, run applications, or deliver content or a service such as streaming videos, web mail, office productivity software, or social media. Instead of accessing files and data from a local or personal computer, you are accessing them online from any internet-capable device—the information will be available anywhere you go and anytime you need it. In the case of this embodiment the cloud 1518 is securely storing and generating public key and private key pairs for each component in the vehicle 1516.
As non-limiting examples, there are four different methods to deploy 8 resources.
These include: a public cloud 1518 that shares resources and offers services to the public over the Internet; a private cloud that isn't shared and offers services over a private internal network typically hosted on-premises; a hybrid cloud that shares services between public and private clouds depending on their purpose; and a community cloud 1518 that shares resources only between organizations, such as with government institutions.
In one embodiment, system 10 is coupled to the cloud 1518.
As used herein, a local area network (LAN) is a network that interconnects within a limited area such as a residence, school, laboratory, university campus or office building. By contrast, a wide area network (WAN) not only covers a larger geographic distance, but also generally involves leased telecommunication circuits. Ethernet and Wi-Fi are two common technologies in use for local area networks. Historical network technologies include ARCNET, Token ring, and AppleTalk.
As a non-limiting example, a wide area network (WAN) is a network that exists over a large-scale geographical area. A WAN connects different smaller networks, including local area networks (LANs) and metro area networks (MANs). This ensures that computers and users in one location can communicate with computers and users in other locations. WAN implementation can be done either with the help of the public transmission system or a private network.
As a non-limiting example, system 10 is coupled to the cloud. This can be achieved via GSM, WiFi, satellite, a mobile device and the like.
Other wireless standards that are specifically designed for IoT devices are becoming available such as Lora, NB-IOT and LTE-M, and the like.
As a non-limiting example, in one embodiment one or more hardware elements 1510 of the vehicle 1516 has public keys 1514 stored therein. Secure encryption is not put on the hardware elements 1510.
A vehicle 1516 consists of one or more in individual components 1520. Individual components 1520 of the vehicle 1516 are given an Acton Unique Identifier (AUIDs). When a vehicle 1516 is activated the first time, a unique public key 1514 and private key 1512 pair are generated by the cloud. AUIDs, public key and private keys 1514 and 1512 are then stored in the cloud. Each component stores its AUID and public key in persistent memory within the component thus eliminating theft of private keys 1512.
For selected components 1520 of the vehicle 1516, the cloud 1518 produces a unique private key 1512 and a public key 1514. As a non-limiting example, with the present invention, private keys 15112 are secure and in the cloud. They cannot be taken from the vehicle 1516. Non-limiting examples of vehicle 1516 components 1520 with public keys 1514 include but are not limited to: IOTA, the battery, motor controller, and the like.
As non-limiting examples, a simple electric vehicle 1516 can include a battery; vehicle control unit (motor controller), and IoT gateway. Each of these components 1520 is given an AUID. Additional components 1520 include but are not limited to vehicle locks; dashboards; helmets; docking stations; and the like.
As non-limiting examples, selected vehicle components 1520 have unique IDs with a unique identifier. These components 1520 are given a unique key pair. As a non-limiting example, the private key 1512 is securely stored in the cloud. An associated public key 1512 is stored in the vehicle components 1520. Communication in the cloud 1518 can be authenticated with the vehicle 1516 through the components 1520 that have public keys.
As a non-limiting example of authentication steps, public keys 1514 are passed to the vehicle 1516, e.g., vehicle components 1520. The private key 1512 is stored in the cloud, and the public key 1514 is transferred to a respective vehicle component.
As a non-limiting example, when the vehicle 1516 connects to the server 1522, it tells the server 1522 it has components 1520 A, B, and C. The System looks up in an associated database and generates an activation message composed of multiple parts, each part signed with the private key 1512 that corresponds to the AUID of the vehicle component A, B, or C 1510. When the activation message is received by the vehicle 1516, the individual components 1520 A, B, and C will decrypt and verify their parts of the message. If anyone component's message part fails verification, the vehicle 1516 will not activate.
As a non-limiting example, a secret key is not needed that unlocks the entire scoter. Instead, the system creates components 1520 are identified as being unique with associated keys.
In one embodiment fleets of vehicles are used to distribute information between vehicles in the fleet. As a non-limiting example, individual fleet vehicles have two wireless communication networks. The first is any kind of cloud 1518 connectively. The second one is any kind of local wireless communication.
When vehicles communicate with the cloud, they report their status occasionally. When they report status, they report the presence of other fleet-vehicles that they have detected on local wireless. As a non-limiting example, this status message can then be communicated with other fleet vehicles IDs that are within local communication. This provides information about the location of fleet vehicles, which can be used to reduce theft and increase fleet availability.
As a non-limiting example, data can be distributed to the fleet by seeding it to only certain vehicles, and these vehicles that receive the communications then communicate with other vehicles. Data that could be sent includes, but is not limited to updates, navigation information, vehicle configuration, secure one-time-keys. This mechanism decreases fleet-wide data-usage and improves fleet operation.
As a non-limiting example, a vehicle 1516 can detect, via local wireless communication, other vehicles, report their presence to the cloud, and the can then determine if another vehicle 1516 is located within a selected proximity. The cloud 1518 can then determine if the reporting vehicle 1516 can communicate data to the other vehicle. The cloud 1518 can then send a one-time use session key to the vehicles, allowing them to communicate securely.
When a vehicle 1516 communicates with the cloud 1518 that it sees another vehicle, it sends this message up to the cloud. The cloud 1518 can use this vehicle 1516 presence information to disable vehicles, track stolen vehicles, locate missing vehicles, and the like.
Fleet vehicles are vehicles operated by an entity that provides them for public or private use to individuals or employees. A fleet is a group of one or more Fleet Vehicles that an operator makes available for use. Private vehicles are vehicles operated by individuals for their own use.
In one embodiment, this invention can be used with both fleet and individual vehicles. If individual or fleet Operators of EV include their vehicle 1516 in this system, the benefits of lost vehicle 1516 discovery, reduced data usage, and the like can be extended across fleets and individuals. In this way, the fleet vehicles of Operator A can look for a stolen fleet vehicle 1516 of Operator B, while a private vehicle 1516 operated by individual C can receive software update data from Operator A's fleet.
When misplaced or stolen fleet or individual vehicles are located, the owner and/or authorities can be notified.
It is to be understood that the present disclosure is not to be limited to the specific examples illustrated and that modifications and other examples are intended to be included within the scope of the appended claims. Moreover, although the foregoing description and the associated drawings describe examples of the present disclosure in the context of certain illustrative combinations of elements and/or functions, it should be appreciated that different combinations of elements and/or functions may be provided by alternative implementations without departing from the scope of the appended claims. Accordingly, parenthetical reference numerals in the appended claims are presented for illustrative purposes only and are not intended to limit the scope of the claimed subject matter to the specific examples provided in the present disclosure.
This application is a Continuation-In-Part of U.S. patent application Ser. No. 16/569,151, filed Sep. 12, 2019, which claims the benefit of U.S. Provisional Patent Application No. 62/864,927, filed Jun. 21, 2019, all of which are incorporated by reference herein in their entirety for all purposes.
Number | Date | Country | |
---|---|---|---|
62864927 | Jun 2019 | US |
Number | Date | Country | |
---|---|---|---|
Parent | 16569151 | Sep 2019 | US |
Child | 16843916 | US |