US 12,348,534 B2
Method and system for detecting intrusion in a vehicle system
Sharika K. Kumar, Columbus, IN (US); Subhojeet Mukherjee, Columbus, IN (US); Howard Bishop, Columbus, IN (US); Christopher S. York, Greenwood, IN (US); and Andrew T. Hillery, Bloomington, IN (US)
Assigned to Cummins Inc., Columbus, IN (US)
Appl. No. 17/611,084
Filed by Cummins Inc., Columbus, IN (US)
PCT Filed May 13, 2020, PCT No. PCT/US2020/032710
§ 371(c)(1), (2) Date Nov. 12, 2021,
PCT Pub. No. WO2020/232147, PCT Pub. Date Nov. 19, 2020.
Claims priority of provisional application 62/846,999, filed on May 13, 2019.
Prior Publication US 2022/0232022 A1, Jul. 21, 2022
Int. Cl. H04L 9/40 (2022.01); B60R 25/20 (2013.01); B60R 25/30 (2013.01)
CPC H04L 63/1416 (2013.01) [B60R 25/20 (2013.01); B60R 25/30 (2013.01)] 19 Claims
OG exemplary drawing
 
1. A method of improving security of a computing system having a network of embedded devices, the method comprising:
(a) obtaining an expected number of cyclic messages to be received within a predetermined length of time;
(b) starting a timer of the predetermined length of time;
(c) when the timer is running, incrementing a message counter each time a cyclic message is received within the predetermined length of time, such that each increment of the message counter represents one cyclic message that is received before the timer ends at the end of the predetermined length of time;
(d) when the timer ends, incrementing a set counter in response to the message counter exceeding the expected number of cyclic messages to be received by a first threshold value;
(e) repeating steps (b), (c), and (d) during which the set counter is continuously incremented until the set counter exceeds a second threshold value; and
(f) detecting an intrusion in the system in response to the set counter exceeding the second threshold value.