Patents by Inventor Kevin M. Baltes

Kevin M. Baltes has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 11420656
    Abstract: A vehicle system comprising a plurality of subsystems, each of the plurality of subsystems configured to perform at least a portion of at least one of a plurality of functions. The plurality of functions are organized in a hierarchy of functions including complex higher order functions and simpler lower order functions. The vehicle system further comprises an advanced computing module configured to control the plurality of subsystems in order to perform a higher order function and a lower order function that supports the higher order function. The advanced computing module comprises software instructions including a first gate point. The first gate point may be activated to prevent the advanced computing module from performing the higher order function.
    Type: Grant
    Filed: July 13, 2020
    Date of Patent: August 23, 2022
    Assignee: GM GLOBAL TECHNOLOGY OPERATIONS LLC
    Inventors: Joseph E. Ploucha, Kevin M. Baltes
  • Publication number: 20220009523
    Abstract: A vehicle system comprising a plurality of subsystems, each of the plurality of subsystems configured to perform at least a portion of at least one of a plurality of functions. The plurality of functions are organized in a hierarchy of functions including complex higher order functions and simpler lower order functions. The vehicle system further comprises an advanced computing module configured to control the plurality of subsystems in order to perform a higher order function and a lower order function that supports the higher order function. The advanced computing module comprises software instructions including a first gate point. The first gate point may be activated to prevent the advanced computing module from performing the higher order function.
    Type: Application
    Filed: July 13, 2020
    Publication date: January 13, 2022
    Inventors: Joseph E. PLOUCHA, Kevin M. BALTES
  • Patent number: 10678954
    Abstract: A system and method of evaluating one or more cybersecurity vulnerabilities to establish a priority metric for each of the one or more cybersecurity vulnerabilities, the method including: constructing a cybersecurity attack schema for each of the one or more cybersecurity vulnerabilities; determining, for each of the plurality of malicious actions of each of the one or more cybersecurity vulnerabilities, one or more resource metrics; obtaining, for each of the one or more cybersecurity vulnerabilities, one or more final resource metrics based on evaluating each of the one or more resource metrics; obtaining, for each of the one or more cybersecurity vulnerabilities, an impact metric that is indicative of a degree of damage that can be caused by the cybersecurity vulnerability; and calculating, for each of the one or more cybersecurity vulnerabilities, a cybersecurity priority level based on the impact metric and the one or more final resource metrics.
    Type: Grant
    Filed: September 21, 2017
    Date of Patent: June 9, 2020
    Assignee: GM GLOBAL TECHNOLOGY OPERATIONS LLC
    Inventors: Kevin M. Baltes, Karl B. Leboeuf
  • Publication number: 20200034574
    Abstract: A system and method of evaluating one or more cybersecurity vulnerabilities to establish a priority metric for each of the one or more cybersecurity vulnerabilities, the method including: constructing a cybersecurity attack schema for each of the one or more cybersecurity vulnerabilities; determining, for each of the plurality of malicious actions of each of the one or more cybersecurity vulnerabilities, one or more resource metrics; obtaining, for each of the one or more cybersecurity vulnerabilities, one or more final resource metrics based on evaluating each of the one or more resource metrics; obtaining, for each of the one or more cybersecurity vulnerabilities, an impact metric that is indicative of a degree of damage that can be caused by the cybersecurity vulnerability; and calculating, for each of the one or more cybersecurity vulnerabilities, a cybersecurity priority level based on the impact metric and the one or more final resource metrics.
    Type: Application
    Filed: September 21, 2017
    Publication date: January 30, 2020
    Inventors: Kevin M. Baltes, Karl B. Leboeuf
  • Patent number: 10430178
    Abstract: An updating system of a vehicle includes a communication module configured to wirelessly download an over the air (OTA) update package. The OTA update package includes: a predetermined period for beginning installation of the OTA update package; an indicator of a module and code to be updated; and replacement code. A display control module is configured to, when a transmission of the vehicle is in park and the predetermined period has not yet passed after the downloading of the OTA update package, display a message on a display within a passenger cabin of the vehicle. The message solicits user input regarding whether to: (i) begin installation of the OTA update package; or (ii) install the OTA update package at a later time.
    Type: Grant
    Filed: February 19, 2018
    Date of Patent: October 1, 2019
    Assignee: GM GLOBAL TECHNOLOGY OPERATIONS LLC
    Inventors: Monica E. Mitchell, Kevin M. Baltes, Brian J. Ciesinski, Peter M. Ansbro, Scott E. Jackson, Kathleen S. McMahon, Kelly M. Comastro
  • Publication number: 20190258466
    Abstract: An updating system of a vehicle includes a communication module configured to wirelessly download an over the air (OTA) update package. The OTA update package includes: a predetermined period for beginning installation of the OTA update package; an indicator of a module and code to be updated; and replacement code. A display control module is configured to, when a transmission of the vehicle is in park and the predetermined period has not yet passed after the downloading of the OTA update package, display a message on a display within a passenger cabin of the vehicle. The message solicits user input regarding whether to: (i) begin installation of the OTA update package; or (ii) install the OTA update package at a later time.
    Type: Application
    Filed: February 19, 2018
    Publication date: August 22, 2019
    Applicant: GM Global Technology Operations LLC
    Inventors: Monica E. MITCHELL, Kevin M. BALTES, Brian J. CIESINSKI, Peter M. ANSBRO, Scott E. JACKSON, Kathleen S. MCMAHON, Kelly M. COMASTRO
  • Patent number: 10038565
    Abstract: Methods and systems are provided for bypassing an authenticity check for a secure control module. In one embodiment, a method includes: receiving authenticity data from a secure source, wherein the authenticity data includes a signature and an identifier that is unique to the control module; programming the control module with the authenticity data; and bypassing the authenticity check of a control program of the control module based on the authenticity data.
    Type: Grant
    Filed: December 20, 2012
    Date of Patent: July 31, 2018
    Assignee: GM GLOBAL TECHNOLOGY OPERATIONS LLC
    Inventors: Ansaf I. Alrabady, Kevin M. Baltes, J. David Rosa, Thomas M. Forest, Alan D. Wist
  • Patent number: 9912754
    Abstract: A system and method of regulating data communications between a vehicle electronics system and a computing device includes: communicatively linking a first data port of an isolation device with the vehicle electronics system; communicatively linking a second data port of the isolation device with the computing device; receiving data at the isolation device sent between the computing device and the vehicle electronics system; and permitting the data to pass through the isolation device based on the identity of the computing device, the rate at which the data passes through the isolation device, or the content of the data.
    Type: Grant
    Filed: May 1, 2015
    Date of Patent: March 6, 2018
    Assignee: GM Global Technology Operations LLC
    Inventors: Corey Wideman, Kevin M. Baltes, Joseph E. Ploucha, Thomas M. Forest, Michael L. Imel
  • Patent number: 9866542
    Abstract: A system and method of responding to unauthorized electronic access to a vehicle includes: receiving data indicating unauthorized electronic access to electronic hardware in the vehicle; initiating an electronic hardware countermeasure in response to the unauthorized electronic access; generating a command set that instructs at least a portion of the electronic hardware to implement the electronic hardware countermeasure; and communicating the command set to the portion of the electronic hardware.
    Type: Grant
    Filed: January 28, 2015
    Date of Patent: January 9, 2018
    Assignee: GM Global Technology Operations
    Inventors: Kevin M. Baltes, Thomas M. Forest, Joseph E. Ploucha
  • Patent number: 9578047
    Abstract: Systems and methods are provided for monitoring and detecting intrusions and authenticating messages on a communication network of a vehicle. A plurality of signals transmitted over communications network between an electronic control module and a remote electronic module are monitored. Reflectometry feature sets are extracted from the plurality of signals and compared to a repository of predetermined communication network feature sets to generate a mismatch value. The mismatch value is compared to a predetermined threshold range and an authenticated event occurs when the mismatch value is within the predetermined threshold range. When the mismatch value is outside the predetermined threshold range, a flagged event occurs and is recorded.
    Type: Grant
    Filed: January 13, 2015
    Date of Patent: February 21, 2017
    Assignee: GM GLOBAL TECHNOLOGY OPERATIONS LLC
    Inventors: Moshe Laifenfeld, Yuval Polevoy, Timothy D. Julson, Kevin M. Baltes, Omer Cohen
  • Publication number: 20160323386
    Abstract: A system and method of regulating data communications between a vehicle electronics system and a computing device includes: communicatively linking a first data port of an isolation device with the vehicle electronics system; communicatively linking a second data port of the isolation device with the computing device; receiving data at the isolation device sent between the computing device and the vehicle electronics system; and permitting the data to pass through the isolation device based on the identity of the computing device, the rate at which the data passes through the isolation device, or the content of the data.
    Type: Application
    Filed: May 1, 2015
    Publication date: November 3, 2016
    Inventors: Corey WIDEMAN, Kevin M. BALTES, Joseph E. PLOUCHA, Thomas M. FOREST, Michael L. IMEL
  • Publication number: 20160219028
    Abstract: A system and method of responding to unauthorized electronic access to a vehicle includes: receiving data indicating unauthorized electronic access to electronic hardware in the vehicle; initiating an electronic hardware countermeasure in response to the unauthorized electronic access; generating a command set that instructs at least a portion of the electronic hardware to implement the electronic hardware countermeasure; and communicating the command set to the portion of the electronic hardware.
    Type: Application
    Filed: January 28, 2015
    Publication date: July 28, 2016
    Inventors: Kevin M. Baltes, Thomas M. Forest, Joseph E. Ploucha
  • Publication number: 20160205117
    Abstract: Systems and methods are provided for monitoring and detecting intrusions and authenticating messages on a communication network of a vehicle. A plurality of signals transmitted over communications network between an electronic control module and a remote electronic module are monitored. Reflectometry feature sets are extracted from the plurality of signals and compared to a repository of predetermined communication network feature sets to generate a mismatch value. The mismatch value is compared to a predetermined threshold range and an authenticated event occurs when the mismatch value is within the predetermined threshold range. When the mismatch value is outside the predetermined threshold range, a flagged event occurs and is recorded.
    Type: Application
    Filed: January 13, 2015
    Publication date: July 14, 2016
    Inventors: MOSHE LAIFENFELD, YUVAL POLEVOY, TIMOTHY D. JULSON, KEVIN M. BALTES, OMER COHEN
  • Patent number: 9021246
    Abstract: A system and method for writing a new or replacement public key to a bootloader stored in a memory segment in the memory of a vehicle ECU without having to rewrite the entire bootloader. The method includes defining a key table in the bootloader memory segment includes a number of vacant memory slots that are available to store replacement public keys if they are needed. The key table is a separate section of the bootloader memory segment so that the key table memory slots are not used by the bootloader code.
    Type: Grant
    Filed: July 24, 2012
    Date of Patent: April 28, 2015
    Assignee: GM Global Technology Operations LLC
    Inventors: Kevin M. Baltes, Thomas M. Forest, Mark H. Costin, Ansaf I. Alrabady
  • Patent number: 8978160
    Abstract: A system and method for validating a software file to be installed into a controller. The method includes preparing the software file including assigning a software version code to the software file, assigning a security version code to the software file, and signing the software file with the software file version code and the security version code. The signed software file is presented to the controller for installing on the controller and the controller verifies the software file signature to determine if the software file is valid and the security version code is valid. The controller allows the software file to be installed in the controller if both the signed software file is valid and the security version code is valid.
    Type: Grant
    Filed: September 12, 2012
    Date of Patent: March 10, 2015
    Assignee: GM Global Technology Operations LLC
    Inventors: Ansaf I. Alrabady, Kevin M. Baltes, Thomas M. Forest
  • Patent number: 8966248
    Abstract: A server includes an import module that receives a first content file and a first instruction file from a design network. The first instruction file includes a first set of parameters. A job request module, based on the first instruction parameter set, determines a second parameter set and generates a second instruction file comprising the second parameter set. The job request module transmits the first content file and the second parameter set to a signature server. An export module receives a signature file from the signature server. The signature server generates the signature file based on the second instruction file. The export module integrates the signature into the first content file to generate a second content file and downloads the second content file to at least one of a service server, a manufacturing server, and a supplier network.
    Type: Grant
    Filed: September 26, 2012
    Date of Patent: February 24, 2015
    Assignee: GM Global Technology Operations LLC
    Inventors: Kevin M. Baltes, Thomas M. Forest
  • Patent number: 8930710
    Abstract: A system and method for verifying that operating software and calibration files are present and valid after a bootloader flashes the files into the memory on a vehicle ECU before allowing the operating software to execute. The ECU memory defines a memory segment for the operating software and the calibration files. A software manifest is provided in a memory slot before the operating software segment in the memory. Likewise, a calibration manifest is provided in a memory slot before the calibration segment in the ECU memory. After the software has been flashed into the ECU memory, a software flag is set in the software manifest memory slot and each time a calibration file is flashed, a calibration flag for the particular calibration file is set in the calibration manifest.
    Type: Grant
    Filed: July 24, 2012
    Date of Patent: January 6, 2015
    Assignee: GM Global Technology Operations LLC
    Inventors: Kevin M. Baltes, James T. Kurnik, Ronald J. Gaynier, Thomas M. Forest, Ansaf I. Alrabady
  • Patent number: 8881308
    Abstract: A system and method for installing software on a secure controller without requiring the software to be properly signed. The method includes determining whether a by-pass flag has been set in the controller that identifies whether a file validation procedure is required to install the file and performing a pre-check operation to determine whether predetermined parameters of the file have been satisfied. The method also includes installing the file into a memory in the controller if the pre-check operation has been satisfied. The method further includes determining whether the file has a proper signature and indicating that the signature is proper if the by-pass flag is set and the file does not include a proper signature, and allowing the file to be installed if the signature has been indicated as being proper.
    Type: Grant
    Filed: September 12, 2012
    Date of Patent: November 4, 2014
    Assignee: GM Global Technology Operations LLC
    Inventors: Kevin M. Baltes, Ansaf I. Alrabady, Thomas M. Forest
  • Patent number: 8856538
    Abstract: A system and method for securely flashing a controller, where the controller includes at least one main processor and at least one secondary processor, and where the processing duties are distributed between the processors. A programming tool provides a content file to be flashed and a digital signature to the controller. The controller calculates a hash value of the content file, decrypts the digital signature using a public key to generate a decrypted hash value, compares the decrypted hash value to the calculated hash value, and determines that the content file is valid if the decrypted hash code matches the calculated hash value, where one or more of the steps of calculating the hash value, decrypting the digital signature, comparing the decrypted hash value to the calculated hash value and determining that the content file is valid, is performed by the main processor for the secondary processor.
    Type: Grant
    Filed: July 27, 2012
    Date of Patent: October 7, 2014
    Assignee: GM Global Technology Operations LLC
    Inventors: Mark H. Costin, Ansaf I. Alrabady, Kevin M. Baltes
  • Patent number: 8856536
    Abstract: A method for authenticating a piece of firmware to be downloaded to a controller. The method includes signing the firmware or a first part of the firmware with a first private key at a first trusted source and signing the firmware or a second part of the firmware with a second private key at a second trusted source. The method also includes validating the signed firmware or the first part of the firmware using a first public key at the controller and validating the firmware or the second part of the firmware using a second public key at the controller. The method further includes authenticating the firmware if the firmware or the first part of the firmware is validated by the first public key at the controller and the firmware or the second part of the firmware is validated by the second public key at the controller.
    Type: Grant
    Filed: December 15, 2011
    Date of Patent: October 7, 2014
    Assignee: GM Global Technology Operations LLC
    Inventors: Nader M. Rabadi, Kevin M. Baltes