Patents by Inventor William Whyte
William Whyte has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20230298388Abstract: Methods, systems, and devices for road usage charging (RUC) are described. RUC computation may be performed at a vehicle using a vehicle computing device (VCD) that is trusted by a service provider, charger, or both. The VCD may be trusted to collect high accuracy, high resolution time and location data for RUC, and also compute for itself what the RUC charge is according to one or more applicable charge policies that are provided to the VCD. Anonymity related to specific vehicle and location information may be provided by encrypting portions of RUC data that are decryptable by different entities with reduced likelihood of revealing specific vehicle, location, and time information.Type: ApplicationFiled: March 17, 2022Publication date: September 21, 2023Inventors: Drew Foster Van Duren, Sean Vincent Maschue, Virendra Kumar, William Whyte, Jonathan Petit, Anthony Bahadir Lopez
-
Publication number: 20230217227Abstract: This disclosure provides systems, methods, and devices for wireless communication that support enhanced Basic Safety Message (BSM) reporting. In a first aspect, a method of wireless communication includes receiving, by a wireless communication device, a C-V2X message from another wireless communication device; and transmitting, by the wireless communication device, a safety message including path history information responsive to determining a path history information trigger condition is satisfied based on the C-V2X message. In a second aspect, a method of wireless communication includes receiving, by a wireless communication device, a C-V2X message from another wireless communication device; and transmitting, by the wireless communication device, a safety message including certificate information responsive to determining a certificate information trigger condition is satisfied based on the C-V2X message. Other aspects and features are also claimed and described.Type: ApplicationFiled: January 4, 2022Publication date: July 6, 2023Inventors: Sean Vincent Maschue, Mohammad Nekoui, Soumya Das, William Whyte
-
Patent number: 11663908Abstract: Methods, misbehavior management systems, non-transitory processor-readable media of various embodiments provide for managing the generation, storage, and transmission of misbehavior reports from vehicle-to-everything (V2X) onboard equipment to an associated entity, such as a misbehavior managing authority. Various embodiments may include detecting a misbehavior condition has occurred and determining whether to generate a misbehavior report based on an aggregated criticality value. The misbehavior management system may then determine whether to store the generated misbehavior report. The misbehavior management system may also determine whether to transmit the generated misbehavior report to a misbehavior managing authority. In some embodiments, the misbehavior management system may determine which stored misbehavior reports may be deleted from storage.Type: GrantFiled: May 11, 2021Date of Patent: May 30, 2023Assignee: QUALCOMM IncorporatedInventors: Jonathan Petit, William Whyte, Cong Chen, Jean-Philippe Monteuuis, Mohammad Raashid Ansari
-
Publication number: 20230094196Abstract: An implantable medical device having a soft tissue interfacing surface comprises at least one soft actuatable capsule having a soft tissue interfacing deflectable membrane configured for cyclical deflection upon actuation of the capsule to modulate the biomechanics of the soft tissue interface during use. The actuatable capsule may comprise an actuation chamber containing a first fluid, a therapeutic chamber containing a second fluid, a deflectable membrane separating the actuation chamber and therapeutic chamber, and an actuation conduit in fluidic communication with the actuation chamber for pneumatic actuation of the actuation chamber. The therapeutic chamber comprises the soft tissue interfacing deflectable membrane which is configured to cyclically deflect during actuation of the capsule and modulate the biomechanics of the soft tissue interface by altering one or more of strain, fluid flow and cellular activity in peri-implant tissue at the soft tissue interface.Type: ApplicationFiled: June 29, 2020Publication date: March 30, 2023Applicants: NATIONAL UNIVERSITY OF IRELAND, GALWAY, MASSACHUSETTS INSTITUTE OF TECHNOLOGYInventors: Ellen ROCHE, Eimear DOLAN, Garry DUFFY, Sandra ROTHENBUCHER, William WHYTE, Claudia VARELA, Scott ROBINSON, Keegan MENDEZ
-
Patent number: 11589236Abstract: Embodiments are disclosed that include systems and methods performed by vehicle-to-everything (V2X) system participant to determine whether a misbehavior condition may have occurred based on the generation and/or receipt of a V2X message. The detection of a misbehavior condition may occur if the V2X message is generated and/or received too frequently or not frequently enough. In addition, a misbehavior condition may be detected if the generated and/or received V2X message does include the appropriate security credential.Type: GrantFiled: July 1, 2022Date of Patent: February 21, 2023Assignee: QUALCOMM IncorporatedInventors: Jean-Philippe Monteuuis, Jonathan Petit, William Whyte, Mohammad Raashid Ansari, Cong Chen
-
Patent number: 11552805Abstract: A form of the invention is applicable for use in conjunction with a security credential management system that produces and manages pseudonym digital certificates issued to vehicles and used by vehicles to establish trust in vehicle-to-vehicle communications, the security credential management system including a pseudonym certificate authority processor entity which issues pseudonym digital certificates to vehicles, a registration authority processor entity that validates, processes and forwards requests for pseudonym digital certificates to the pseudonym certificate authority processor entity, and a misbehavior authority processor entity that receives misbehavior reports from reporter vehicles that include information about the reporter vehicles and suspect misbehaving vehicles and is responsible for producing a list of revoked credentials; the pseudonym certificate processor entity and registration authority processor entity participating in producing linkage values to be contained within the issued pseudonType: GrantFiled: December 3, 2018Date of Patent: January 10, 2023Assignee: OnBoard Security, Inc.Inventors: Virendra Kumar, William Whyte, Abhishek Jain
-
Publication number: 20230004627Abstract: Systems and techniques are described for token device transfer management. A system identifies, in a payload of at least one block of a distributed ledger, a token corresponding to media content. A parameter of the token in the distributed ledger indicates that the token is associated with a first user. The system identifies a device that is associated with the token and the media content. The device is also associated with the first user. The system identifies that the device has been relocated to an area associated with a second user. In response to identifying that the device has been relocated to the area, the system causes the parameter of the token in the distributed ledger to be modified from indicating that the token is associated with the first user to indicating that the token is associated with the second user.Type: ApplicationFiled: June 3, 2022Publication date: January 5, 2023Inventors: Wesley James HOLLAND, Jonathan KIES, Brian VOGELSANG, Abhijeet BISAIN, William WHYTE, Michael Franco TAVEIRA
-
Patent number: 11533613Abstract: Embodiments include devices and methods for providing secure communications between a first computing device and a second computing device are disclosed. A processor of the first computing device may determine in a first application software first security key establishment information. The processor may provide the first security key establishment information to a communication layer of the first computing device for transmission to the second computing device. The processor may receive, in the first application software from the communication layer of the first computing device, second security key establishment information received from the second computing device. The processor may determine a first security key by the first application software based at least in part on the second security key establishment information. The processor may provide the first security key to the communication layer for protecting messages from the first application software to the second computing device.Type: GrantFiled: May 21, 2020Date of Patent: December 20, 2022Assignee: QUALCOMM IncorporatedInventors: Adrian Edward Escott, William Whyte, Anand Palanigounder
-
Publication number: 20220391889Abstract: Systems and techniques are described for situational token generation. A system receives media content that is based on sensor data captured by at least one sensor of a media device. The system determines a position of the media device. The system determines that the position of the media device is within a geographic area. In response to determining that the position of the media device is within the geographic area, the system generates a token corresponding to the media content. A payload of at least one block of a distributed ledger identifies the token.Type: ApplicationFiled: June 3, 2022Publication date: December 8, 2022Inventors: Wesley James HOLLAND, Jonathan KIES, Brian VOGELSANG, Abhijeet BISAIN, William WHYTE, Michael Franco TAVEIRA
-
Publication number: 20220393873Abstract: Systems and techniques are described for situational token-associated media output. A system receives sensor data captured by at least one sensor of a media device. The system identifies, based on the sensor data, a relationship between the media device and an anchor element that is associated with a token. The system identifies the token in a payload of at least one block of a distributed ledger. The token corresponds to media content according to the distributed ledger. The system generates a representation of the media content corresponding to the token. In response to identifying the relationship between the media device and the anchor element, the system outputs the representation of the media content.Type: ApplicationFiled: June 3, 2022Publication date: December 8, 2022Inventors: Wesley James HOLLAND, Jonathan KIES, Brian VOGELSANG, Abhijeet BISAIN, William WHYTE, Michael Franco TAVEIRA
-
Publication number: 20220338012Abstract: Embodiments are disclosed that include systems and methods performed by vehicle-to-everything (V2X) system participant to determine whether a misbehavior condition may have occurred based on the generation and/or receipt of a V2X message. The detection of a misbehavior condition may occur if the V2X message is generated and/or received too frequently or not frequently enough. In addition, a misbehavior condition may be detected if the generated and/or received V2X message does include the appropriate security credential.Type: ApplicationFiled: July 1, 2022Publication date: October 20, 2022Inventors: Jean-Philippe MONTEUUIS, Jonathan PETIT, William WHYTE, Mohammad Raashid ANSARI, Cong CHEN
-
Publication number: 20220295239Abstract: Methods and devices for implementing the methods for communicating vehicle-to-everything (V2X) information to a network node include transmitting a first V2X message that is associated with a first service and that includes an identifier of a second service, and transmitting a second V2X message that is associated with the second service and that includes an identifier of the first service configured to enable the network node to use information from the first V2X message with the second service. The network node may receive the first V2X message and the second V2X message, and may use information from the first V2X message with the second service.Type: ApplicationFiled: September 23, 2021Publication date: September 15, 2022Inventors: William Whyte, Sean Vincent Maschue, Drew Foster Van Duren
-
Publication number: 20220295274Abstract: Methods and devices and systems for implementing the methods for authenticating plaintext and ciphertext in a vehicle-to-everything (V2X) message include generating ciphertext from a plaintext message to be transmitted in a V2X message, generating a hash of the ciphertext and a hash of the plaintext message, generating a digital signature of a concatenation of the hash of the ciphertext and the hash of the plaintext message, and sending to a network node a V2X message that includes the ciphertext, the hash of the plaintext message, and the digital signature. The hash of the plaintext message, and the digital signature may be configured to enable the network node to verify that the V2X endpoint node signed the concatenation.Type: ApplicationFiled: October 8, 2021Publication date: September 15, 2022Inventors: William WHYTE, Sean Vincent MASCHUE, Drew Foster VAN DUREN, Virendra KUMAR
-
Publication number: 20220256333Abstract: Embodiments include methods performed by vehicle-to-everything (V2X) system for protecting proprietary data within misbehavior reports. Various embodiments may include detecting misbehavior conditions based on received sensor data, determining whether the received sensor data that supports a conclusion that a misbehavior condition has occurred is or includes proprietary information, and encrypting the sensor data that supports the conclusion that the misbehavior condition has occurred in response to determining that the received sensor data is or includes the proprietary information.Type: ApplicationFiled: September 22, 2021Publication date: August 11, 2022Inventors: William WHYTE, Jonathan PETIT, Jean-Philippe MONTEUUIS, Mohammad Raashid ANSARI, Cong CHEN, Virendra KUMAR
-
Patent number: 11405786Abstract: Embodiments are disclosed that include systems and methods performed by vehicle-to-everything (V2X) system participant to determine whether a misbehavior condition may have occurred based on the generation and/or receipt of a V2X message. The detection of a misbehavior condition may occur if the V2X message is generated and/or received too frequently or not frequently enough. In addition, a misbehavior condition may be detected if the generated and/or received V2X message does include the appropriate security credential.Type: GrantFiled: March 25, 2021Date of Patent: August 2, 2022Assignee: QUALCOMM IncorporatedInventors: Jean-Philippe Monteuuis, Jonathan Petit, William Whyte, Mohammad Raashid Ansari, Cong Chen
-
Publication number: 20220230537Abstract: Embodiments include methods performed by a processor of a vehicle-to-everything (V2X) system within a vehicle for detecting misbehavior conditions by comparing information received in V2X messages to local dynamic map data. Various embodiments may include receiving V2X messages from other V2X system participants, determining whether a misbehavior condition is detected by comparing data contained in the received V2X messages to information in a locally maintained or stored local dynamic map data model, detecting a misbehavior condition and generating a misbehavior report identifying the misbehavior condition in response to a conflict or inconsistency between some data in the received V2X message and the local dynamic map.Type: ApplicationFiled: September 23, 2021Publication date: July 21, 2022Inventors: William WHYTE, Jonathan PETIT, Cong CHEN, Jean-Philippe MONTEUUIS
-
Publication number: 20220223033Abstract: Methods, misbehavior management systems, non-transitory processor-readable media of various embodiments provide for managing the generation, storage, and transmission of misbehavior reports from vehicle-to-everything (V2X) onboard equipment to an associated entity, such as a misbehavior managing authority. Various embodiments may include detecting a misbehavior condition has occurred and determining whether to generate a misbehavior report based on an aggregated criticality value. The misbehavior management system may then determine whether to store the generated misbehavior report. The misbehavior management system may also determine whether to transmit the generated misbehavior report to a misbehavior managing authority. In some embodiments, the misbehavior management system may determine which stored misbehavior reports may be deleted from storage.Type: ApplicationFiled: May 11, 2021Publication date: July 14, 2022Inventors: Jonathan PETIT, William WHYTE, Cong CHEN, Jean-Philippe MONTEUUIS, Mohammad Raashid ANSARI
-
Publication number: 20220038855Abstract: A method of providing positioning information includes: receiving, at a first UE from a second UE, a request that includes a location and a geographic region of interest; and sending, from the first UE to the second UE: at least one first one-way tree portion, of a one-way tree, comprising at least one first one-way sub-value corresponding to at least one first sub-area of a map area and that includes the location, the one-way tree corresponding to the map area; and at least one second one-way tree portion of the one-way tree comprising at least one second one-way sub-value and corresponding to at least one second sub-area; the at least one first one-way sub-value and the at least one second one-way sub-value together comprising a complete data set for determining a root value of the one-way tree and correspond, in combination, to the map area.Type: ApplicationFiled: July 29, 2020Publication date: February 3, 2022Inventor: William WHYTE
-
Patent number: 11223605Abstract: The invention is applicable for use in conjunction with a system for connected vehicle communications in which each vehicle in the system is issued a limited number of unique pseudonym certificates that are used by the vehicle to establish trust in messages sent by the vehicle by signing each message with a pseudonym certificate. A method is set forth for selecting a pseudonym certificate for use, from among the vehicle's pseudonym certificates, so as to protect the privacy of the vehicle's activity against attacks by eavesdroppers, including the steps of: tracking and storing vehicle location data; computing, from inputs that include the vehicle location data, the vehicle's relative achievable anonymity in particular geographical regions; prioritizing the pseudonym certificates; and selecting a pseudonym certificate for use from among the pseudonym certificates having a priority that is determined by the relative achievable anonymity for the geographical region in which the certificate is to be used.Type: GrantFiled: February 4, 2019Date of Patent: January 11, 2022Assignee: OnBoard Security, Inc.Inventors: Jonathan Petit, William Whyte
-
Publication number: 20210336797Abstract: Various embodiments enable broadcast communications security. Various embodiments enable the authentication of broadcast communications. Various embodiments may enable asymmetric authentication and integrity protection of small size messages, such as one or more signed messages totaling a length of 250 bytes or less. Various embodiments may support cryptographic signing of beacon type messages using certificates. Various embodiments may include generating a beacon type message, cryptographically signing the beacon type message at least in part using a certificate to generate a signed beacon message, and sending the signed beacon type message in one or more broadcast transmissions in conjunction with, or independently of, certificate information used to verify the signed beacon message.Type: ApplicationFiled: April 27, 2021Publication date: October 28, 2021Inventors: Drew Foster Van Duren, Stefano Faccin, William Whyte