Patents by Inventor Sharath Yadav Doddamane HEMANTHARAJA

Sharath Yadav Doddamane HEMANTHARAJA has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 11961310
    Abstract: Examples are provided for traffic sign detection systems. In one example, a traffic detection system in a vehicle includes an image sensor, a communication system, a processor, and a storage device storing instructions executable by the processor to capture an image of an environment of the vehicle via the image sensor, process the image to detect visual information regarding a traffic sign in the image, the visual information indicating a recognized sign, receive cryptographic data via the communication system from a transmitter associated with the traffic sign, the cryptographic data including a cryptographic representation of a traffic sign signal for controlling the traffic sign, and selectively control one or more vehicle systems of the vehicle based on a cryptographic verification of the recognized sign using the cryptographic data.
    Type: Grant
    Filed: April 24, 2019
    Date of Patent: April 16, 2024
    Assignee: HARMAN INTERNATIONAL INDUSTRIES, INCORPORATED
    Inventors: Asadullah Ansari, Sharath Yadav Doddamane Hemantharaja, Jipin Jose
  • Patent number: 11892872
    Abstract: Techniques are disclosed for the protection and accuracy of system time used in systems, such as automotive systems, from attacks. In some embodiments, a cumulative trustworthiness score is determined for available time sources, other than a real time clock, by adding together trustworthiness scores associated with the available time sources after a system time is initialized to time of the real time clock during booting. The cumulative trustworthiness score is then used to determine an appropriate technique for updating the system time based on time from one of the available time sources, depending on whether the cumulative trustworthiness score is greater than a maximum threshold, between a minimum threshold and the maximum threshold, or less than the minimum threshold.
    Type: Grant
    Filed: February 9, 2021
    Date of Patent: February 6, 2024
    Assignee: Harman International Industries, Incorporated
    Inventors: Asadullah Ansari, Sharath Yadav Doddamane Hemantharaja
  • Publication number: 20240010226
    Abstract: Embodiments are disclosed for reducing unauthorized modifications of object detection systems of motor vehicles. As an example, a method comprises: generating a cryptographic signature for an output of nodes of a fully connected layer of a neural network of an object detection system of a vehicle, the cryptographic signature based in part on a first private key stored in a reply-protected memory block (RPMB), the output at least partially describing a detected object; and, responsive to verifying the cryptographic signature, adjusting vehicle operation based on the detected object. In this way, outputs of the neural network may be verified, so that unauthorized modifications are detected, and system accuracy increases.
    Type: Application
    Filed: September 30, 2020
    Publication date: January 11, 2024
    Inventor: Sharath Yadav Doddamane Hemantharaja
  • Publication number: 20230342456
    Abstract: A system and method to secure lane and traffic management AI models used in an advanced driver assistance system. (ADAS) or in an autonomous vehicle. Only lane and traffic management data recognized from a verifiable source is allowed for testing and training the AI model. All other data is blocked. Controllable parameters of the AI model are encrypted prior to deployment. After deployment, the controllable parameters are decrypted and only signature verified dynamic learning data is applied to the AI model for continuous learning.
    Type: Application
    Filed: September 21, 2020
    Publication date: October 26, 2023
    Applicant: Harman International Industries, Incorporated
    Inventors: Asadullah Ansari, Sharath Yadav Doddamane Hemantharaja, Shyju Thekkumbadan
  • Publication number: 20230343108
    Abstract: Examples are provided for object detection systems for vehicles. In one example, a system for a vehicle includes an image sensor, a processor, and a storage device storing instructions executable by the processor to capture, via the image sensor, an image of an environment of the vehicle, detect an object in the image of the environment of the vehicle, determine whether the object is a projected image of the object, and selectively control one or more vehicle systems of the vehicle to perform one or more actions if the object is not the projected image.
    Type: Application
    Filed: July 1, 2020
    Publication date: October 26, 2023
    Inventor: Sharath Yadav Doddamane Hemantharaja
  • Publication number: 20230292117
    Abstract: Embodiments are disclosed for a group security scheme for an autonomous vehicle engaged in a collaborative machine learning approach. As an example, a method comprises: generating, in a vehicle, a digital signature based on a first key and a second key, both of the first key and the second key received from a group manager, and transmitting a message signed with the digital signature to a collaborator, the message including coefficients of a local machine learning model of the vehicle. In this way, an accuracy of the local machine learning model of the vehicle may be increased, while a privacy of the vehicle is increased.
    Type: Application
    Filed: September 15, 2020
    Publication date: September 14, 2023
    Inventor: Sharath Yadav Doddamane Hemantharaja
  • Publication number: 20230015693
    Abstract: Various embodiments include techniques for recovering a cryptographic key in a system that includes secure storage. A computer system implementing these techniques determines that the cryptographic key stored in a first secure storage is corrupted. The computer system retrieves an emergency key from a second secure storage. The computer system establishes communications with a server by using the emergency key.
    Type: Application
    Filed: July 8, 2022
    Publication date: January 19, 2023
    Inventors: Asadullah ANSARI, Sharath Yadav Doddamane HEMANTHARAJA
  • Publication number: 20220207885
    Abstract: Examples are provided for traffic sign detection systems. In one example, a traffic detection system in a vehicle includes an image sensor, a communication system, a processor, and a storage device storing instructions executable by the processor to capture an image of an environment of the vehicle via the image sensor, process the image to detect visual information regarding a traffic sign in the image, the visual information indicating a recognized sign, receive cryptographic data via the communication system from a transmitter associated with the traffic sign, the cryptographic data including a cryptographic representation of a traffic sign signal for controlling the traffic sign, and selectively control one or more vehicle systems of the vehicle based on a cryptographic verification of the recognized sign using the cryptographic data.
    Type: Application
    Filed: April 24, 2019
    Publication date: June 30, 2022
    Inventors: Asadullah Ansari, Sharath Yadav Doddamane Hemantharaja, Jipin Jose
  • Publication number: 20210247800
    Abstract: Techniques are disclosed for the protection and accuracy of system time used in systems, such as automotive systems, from attacks. In some embodiments, a cumulative trustworthiness score is determined for available time sources, other than a real time clock, by adding together trustworthiness scores associated with the available time sources after a system time is initialized to time of the real time clock during booting. The cumulative trustworthiness score is then used to determine an appropriate technique for updating the system time based on time from one of the available time sources, depending on whether the cumulative trustworthiness score is greater than a maximum threshold, between a minimum threshold and the maximum threshold, or less than the minimum threshold.
    Type: Application
    Filed: February 9, 2021
    Publication date: August 12, 2021
    Inventors: Asadullah ANSARI, Sharath Yadav Doddamane HEMANTHARAJA