Device provisioning and authentication

ABSTRACT

Among other things, techniques are described for provisioning and authentication of devices in vehicles. In one aspect, a device in a vehicle establishes a communication session with a network server that manages provisioning of devices corresponding to an enterprise associated with the vehicle. The device receives instructions from the network server to generate cryptographic keys, and in response, generates a public and private key pair. The device sends, to the network server, a certificate signing request that includes the public key and an identifier of the device. In response, the device receives a digital security certificate for the device, and a security certificate of a signing certificate authority. The device authenticates the security certificate of the certificate authority using a known enterprise root certificate, and upon successful authentication, stores the device security certificate and the security certificate of the signing certificate authority.

FIELD OF THE INVENTION

This description relates to device provisioning and authentication ofelectronic devices that are components in a vehicle.

BACKGROUND

Autonomous or semi-autonomous vehicles include various electroniccomponents to facilitate operations of the vehicles, e.g., sensors togather information about the surrounding environment, processors toprocess the sensor information to control steering or braking, or both,among others. The various electronic components exchange informationamong themselves, or with external remote servers, using messageexchanges.

BRIEF DESCRIPTION OF THE DRAWINGS

FIG. 1 shows an example of a vehicle having autonomous capability.

FIG. 2 shows an example “cloud” computing environment.

FIG. 3 shows a computer system.

FIG. 4 shows an example architecture for an autonomous vehicle.

FIG. 5 shows an example of inputs and outputs that may be used by aperception module.

FIG. 6 shows an example of a LiDAR system.

FIG. 7 shows the LiDAR system in operation.

FIG. 8 shows the operation of the LiDAR system in additional detail.

FIG. 9 shows a block diagram of the relationships between inputs andoutputs of a planning module.

FIG. 10 shows a directed graph used in path planning.

FIG. 11 shows a block diagram of the inputs and outputs of a controlmodule.

FIG. 12 shows a block diagram of the inputs, outputs, and components ofa controller.

FIG. 13 shows an example of an electronic device that is a component ina vehicle and provisioned using the techniques disclosed herein.

FIG. 14 shows an example of a system for provisioning and authenticatedcommunication of an electronic device that is a component in a vehicle,using the techniques disclosed herein.

FIGS. 15A, 15B and 15C show examples of message sequence diagramsassociated with provisioning an electronic device that is a component ina vehicle, using the techniques disclosed herein.

FIG. 16 shows an example process for provisioning an electronic devicethat is a component in a vehicle associated with an enterprise.

FIG. 17 shows an example process for provisioning an electronic devicethat is a component in a vehicle associated with an enterprise.

FIG. 18 shows an example process for changing the provisioning status ofan electronic device that is a component in a vehicle associated with anenterprise.

DETAILED DESCRIPTION

In the following description, for the purposes of explanation, numerousspecific details are set forth in order to provide a thoroughunderstanding of the present invention. It will be apparent, however,that the present invention may be practiced without these specificdetails. In other instances, well-known structures and devices are shownin block diagram form in order to avoid unnecessarily obscuring thepresent invention.

In the drawings, specific arrangements or orderings of schematicelements, such as those representing devices, modules, instructionblocks and data elements, are shown for ease of description. However, itshould be understood by those skilled in the art that the specificordering or arrangement of the schematic elements in the drawings is notmeant to imply that a particular order or sequence of processing, orseparation of processes, is required. Further, the inclusion of aschematic element in a drawing is not meant to imply that such elementis required in all embodiments or that the features represented by suchelement may not be included in or combined with other elements in someembodiments.

Further, in the drawings, where connecting elements, such as solid ordashed lines or arrows, are used to illustrate a connection,relationship, or association between or among two or more otherschematic elements, the absence of any such connecting elements is notmeant to imply that no connection, relationship, or association canexist. In other words, some connections, relationships, or associationsbetween elements are not shown in the drawings so as not to obscure thedisclosure. In addition, for ease of illustration, a single connectingelement is used to represent multiple connections, relationships orassociations between elements. For example, where a connecting elementrepresents a communication of signals, data, or instructions, it shouldbe understood by those skilled in the art that such element representsone or multiple signal paths (e.g., a bus), as may be needed, to affectthe communication.

Reference will now be made in detail to embodiments, examples of whichare illustrated in the accompanying drawings. In the following detaileddescription, numerous specific details are set forth in order to providea thorough understanding of the various described embodiments. However,it will be apparent to one of ordinary skill in the art that the variousdescribed embodiments may be practiced without these specific details.In other instances, well-known methods, procedures, components,circuits, and networks have not been described in detail so as not tounnecessarily obscure aspects of the embodiments.

Several features are described hereafter that can each be usedindependently of one another or with any combination of other features.However, any individual feature may not address any of the problemsdiscussed above or might only address one of the problems discussedabove. Some of the problems discussed above might not be fully addressedby any of the features described herein. Although headings are provided,information related to a particular heading, but not found in thesection having that heading, may also be found elsewhere in thisdescription. Embodiments are described herein according to the followingoutline:

1. General Overview

2. System Overview

3. Autonomous Vehicle Architecture

4. Autonomous Vehicle Inputs

5. Autonomous Vehicle Planning

6. Autonomous Vehicle Control

7. Device Provisioning and Authentication

8. Example Processes for Device Provisioning and Authentication

General Overview

In an embodiment, an electronic device that is a component in a vehicle,such as an autonomous vehicle (AV), is assigned one or morecryptographically secure digital certificates (also referred to as“security certificates” or simply “certificates”) to enable the deviceto authenticate itself to another entity (e.g., an entity that can makeupdates to the firmware of the device), or authenticate the identity ofthe other entity, or both. For example, the electronic device (alsoreferred to simply as a “device”) can use security certificates toauthenticate a manifest server that provides the boot files, firmware,or other configuration information, for configuring the operations ofthe device. Subsequent to the authentication, the manifest server canupdate the device firmware.

In an embodiment, the device is provisioned for use in a vehicle of aplurality of vehicles managed by an enterprise, which can be, forexample, a car rental organization, a public or private transit companyor agency, or other suitable organization that manages a plurality ofvehicles. In this context, provisioning a device in a vehicle refers toproviding a device with one or more cryptographic keys or securitycertificates, or both, such that the device can perform authenticatedcommunication with other entities in the vehicle, or with externalentities (for example, remote servers) in the enterprise. Providing thedevice with a security certificate as part of provisioning the devicebinds an identity of the device (for example, a device serial number) tothe cryptographic keys, based on information included in the securitycertificates.

In an embodiment, the enterprise uses a public key infrastructure (PKI)to securely authenticate and manage devices. For example, the enterpriseuses a root certificate authority (CA) to establish a chain of trustamong various devices of the enterprise. A CA includes a key pair thatis bound to a root identity (e.g., the enterprise's legal name) and ismanaged and made accessible by a server (e.g., centralized networkserver or a group of servers). The acts as a trusted third party forsecure communication, which is trusted by all the devices in theenterprise that engage in authenticated communication. The enterpriseuses one or more device authority servers that are used to authenticatedevices in the enterprise, and one or more device administratorauthority servers used to authenticate entities that reconfigure devicesor update device firmware (e.g., a manifest server). The deviceauthority servers, or the device administrator authority servers, orboth, act as intermediate CAs, e.g., respectively by generating digitalcertificates for devices installed in the enterprise's vehicles, or forentities that reconfigure devices or update device firmware. Theenterprise also uses one or more additional servers that implementfunctions to provide a provisioning service, which fully or partiallyautomates management of the provisioning process for the devices in theenterprise.

In an embodiment, the device has a pre-configured unique, non-modifiableidentity that is used to associate one or more digital certificates forthe device, which can then be used to authenticate communication betweenthe device and other entities associated with the vehicle. For example,the identity can be a serial number, or a combination of a devicemanufacturer name or number and a serial number. The device includeshardware capable of securely generating, storing, and operating oncryptographic keys. For example, the device can include a trustedplatform module (TPM) or a hardware security module (HSM), among others.

The device also includes a provisioning application programminginterface (API) and a device management API. In this context, an APIrefers to one or more software routines that provide a computinginterface to enable interactions between multiple softwareintermediaries. The API specifies the kinds of calls or requests thatcan be made, how to make them, the data formats that should be used, orthe conventions to follow, among others. The one or more softwareroutines for the APIs are implemented using hardware in the device(e.g., using processors or network interface hardware, among others).The provisioning API initiates provisioning by communicating with theprovisioning service of the enterprise. The device management API isused to manage firmware and configuration updates of the device, and todeprovision the device. Additionally or alternatively, the deviceincludes security hardware that can interact with the provisioningservice.

In an embodiment, the device has an enterprise security certificateassociated with the enterprise's root CA, prior to being provisioned.For example, the enterprise can provide its root CA certificate to thedevice manufacturer, which includes the root CA certificate in firmwareinstalled on devices delivered to the enterprise.

When the device is received by the enterprise, a tracking system used bythe enterprise captures the device identity (e.g., by scanning thedevice label, or manually entering the serial number in a web interface,among others), and notifies the provisioning service about the newdevice. The provisioning service adds the device's identity as a recordin a database of active devices used in vehicles associated with theenterprise.

Following installation in a vehicle, the device is first powered up andbooted. By “booted,” we mean that the device executes a series ofinstructions to locate, load, and initialize boot files, which are filesthat contain data used for executing an operating system on the device.During the boot process, the device (e.g., a processor in the device)determines that the device does not have a digital certificate that isbound to the identity of the device (although the device has the digitalcertificate for the enterprise provisioning service). Upon making thisdetermination, the device enables the provisioning API, whichestablishes a communication with the provisioning service of theenterprise. The provisioning service sends its digital certificate tothe device, which authenticates the provisioning service's certificateusing the certificate of the CA. The provisioning service then commandsthe device to generate a key pair. Upon receiving the command, thedevice (e.g., the TPM or HSM in the device) generates a public-privatekey pair, e.g., a Rivest-Shamir-Adleman (RSA) key pair or Elliptic CurveCryptography (ECC) key pair, among others. The private key of the keypair is stored securely in secure storage of the device, e.g., withinthe TPM or HSM. The device generates a certificate signing request (CSR)that includes the public key of the key pair, and sends the CSR to theprovisioning service as a response to the command.

Upon receiving the CSR from the device, the provisioning service checksto confirm that the device's identity is present in a record in thedatabase of active devices, or that the device is not alreadyprovisioned, or both. If the checks indicate that the device's identityis present in the database of active devices but the device is notprovisioned (e.g., the device has been scanned into the system as readyto provision, but has not yet been provisioned), the provisioningservice sends the device CSR to the enterprise PKI. For example, theprovisioning service sends the CSR to a device authority server. Uponreceiving the CSR, the device authority server generates a digitalcertificate (e.g., an x509 certificate) that binds the device's identityto the device public key that is obtained from the CSR. The deviceauthority server then sends a response to the provisioning service. Theresponse includes the generated digital certificate for the device. Inan embodiment, the response also includes a digital certificate (e.g.,an x509 certificate) for the device authority server, or for a deviceadministrator server, or both. The digital certificates of the deviceauthority server and the device administrator server are also referredto as intermediate CA certificates.

The provisioning service forwards the device certificate and theintermediate CA certificates to the device. The device authenticates theintermediate CA certificates using the root CA certificate that ispre-installed on the device. The device then authenticates the digitalcertificate generated for the device using the authenticated certificateof the device authority server that generated the device certificate.Upon successful authentication, the device stores its digitalcertificate and the intermediate CA certificates in storage memorycoupled to the device. The device certificate is subsequently used toauthenticate the device during communication with other entities in thevehicle, or within the enterprise. The intermediate CA certificates areused to authenticate digital certificates received from the otherentities.

In an embodiment, a device is reprovisioned, during which one or morenew cryptographic keys, or new security certificates, are generated forthe device. To reprovision a device, a management server of theenterprise sends a deprovision command to the provisioning service, withthe deprovision command including the device identity. Upon receivingthe deprovision command, the provisioning service deletes the devicedigital certificate that is stored by the provisioning service. Themanagement server also establishes a communication with the device.Following mutual authentication (e.g., using digital certificates), themanagement server sends a deprovision command to the device. Uponreceiving the deprovision command, a device management API in the devicedeletes its existing digital certificate and the public-private keypair. The device can then be reprovisioned by generating a newpublic-private key pair, and following the procedure described in theprevious sections.

In an embodiment, a device is decommissioned. This can be the case, forexample, when a device reaches the end of its service life. In suchcases, a management server of the enterprise notifies the provisioningsystem, with the notification including the device identity (e.g.,serial number). The provisioning service moves the device's identityrecord from its database of active device records to a database ofretired device records, and revokes the device's digital certificate.

In an embodiment, a device that has been provisioned uses the digitalcertificate generated for the device for authentication during devicemanagement. In such cases, for example, when the device boots up, sinceit already has an associated digital certificate stored in memorycoupled to the device, the provisioning API is not enabled, but thedevice management API is enabled. A device administrator entity (e.g., aremote server managed by the enterprise, or a manifest server or anotherelectronic device local to the vehicle) establishes a communication withthe device management API, and mutual authentication takes place. Forexample, the device authenticates a device administrator server using acorresponding intermediate CA certificate that the device receivedduring provisioning. The device administrator authenticates the deviceusing the device's digital certificate. In an embodiment, mutualauthentication is performed using Transport Layer Security (TLS)protocol. In an embodiment, mutual authentication is performed using asecure challenge response protocol. Following mutual authentication, thedevice administrator entity re-configures device, or updates devicefirmware, or both, using the device management API.

The subject matter described herein can provide several technicalbenefits. For instance, embodiments can facilitate authenticatedmachine-to-machine communication with other entities. Only devices thatare registered with the enterprise can be provisioned, therebypreventing spoofing of devices. The disclosed provisioning techniquesensure that only expected devices are deployed in a vehicle: forexample, devices intended for another vehicle, or a malicious implant,among others, are not operational in the vehicle. The provisioningtechniques are also used to authenticate device administrators. Thedisclosed techniques also allow a registered device to be reprovisioned,which enables the device to use refreshed cryptographic keys andassociated certificates, increasing the security of the vehicle.

System Overview

FIG. 1 shows an example of an autonomous vehicle 100 having autonomouscapability.

As used herein, the term “autonomous capability” refers to a function,feature, or facility that enables a vehicle to be partially or fullyoperated without real-time human intervention, including withoutlimitation fully autonomous vehicles, highly autonomous vehicles, andconditionally autonomous vehicles.

As used herein, an autonomous vehicle (AV) is a vehicle that possessesautonomous capability.

As used herein, “vehicle” includes means of transportation of goods orpeople. For example, cars, buses, trains, airplanes, drones, trucks,boats, ships, submersibles, dirigibles, etc. A driverless car is anexample of a vehicle.

As used herein, “trajectory” refers to a path or route to navigate an AVfrom a first spatiotemporal location to second spatiotemporal location.In an embodiment, the first spatiotemporal location is referred to asthe initial or starting location and the second spatiotemporal locationis referred to as the destination, final location, goal, goal position,or goal location. In some examples, a trajectory is made up of one ormore segments (e.g., sections of road) and each segment is made up ofone or more blocks (e.g., portions of a lane or intersection). In anembodiment, the spatiotemporal locations correspond to real worldlocations. For example, the spatiotemporal locations are pick up ordrop-off locations to pick up or drop-off persons or goods.

As used herein, “sensor(s)” includes one or more hardware componentsthat detect information about the environment surrounding the sensor.Some of the hardware components can include sensing components (e.g.,image sensors, biometric sensors), transmitting and/or receivingcomponents (e.g., laser or radio frequency wave transmitters andreceivers), electronic components such as analog-to-digital converters,a data storage device (such as a RAM and/or a nonvolatile storage),software or firmware components and data processing components such asan ASIC (application-specific integrated circuit), a microprocessorand/or a microcontroller.

As used herein, a “scene description” is a data structure (e.g., list)or data stream that includes one or more classified or labeled objectsdetected by one or more sensors on the AV vehicle or provided by asource external to the AV.

As used herein, a “road” is a physical area that can be traversed by avehicle, and may correspond to a named thoroughfare (e.g., city street,interstate freeway, etc.) or may correspond to an unnamed thoroughfare(e.g., a driveway in a house or office building, a section of a parkinglot, a section of a vacant lot, a dirt path in a rural area, etc.).Because some vehicles (e.g., 4-wheel-drive pickup trucks, sport utilityvehicles, etc.) are capable of traversing a variety of physical areasnot specifically adapted for vehicle travel, a “road” may be a physicalarea not formally defined as a thoroughfare by any municipality or othergovernmental or administrative body.

As used herein, a “lane” is a portion of a road that can be traversed bya vehicle. A lane is sometimes identified based on lane markings. Forexample, a lane may correspond to most or all of the space between lanemarkings, or may correspond to only some (e.g., less than 50%) of thespace between lane markings. For example, a road having lane markingsspaced far apart might accommodate two or more vehicles between themarkings, such that one vehicle can pass the other without traversingthe lane markings, and thus could be interpreted as having a lanenarrower than the space between the lane markings, or having two lanesbetween the lane markings. A lane could also be interpreted in theabsence of lane markings. For example, a lane may be defined based onphysical features of an environment, e.g., rocks and trees along athoroughfare in a rural area or, e.g., natural obstructions to beavoided in an undeveloped area. A lane could also be interpretedindependent of lane markings or physical features. For example, a lanecould be interpreted based on an arbitrary path free of obstructions inan area that otherwise lacks features that would be interpreted as laneboundaries. In an example scenario, an AV could interpret a lane throughan obstruction-free portion of a field or empty lot. In another examplescenario, an AV could interpret a lane through a wide (e.g., wide enoughfor two or more lanes) road that does not have lane markings. In thisscenario, the AV could communicate information about the lane to otherAVs so that the other AVs can use the same lane information tocoordinate path planning among themselves.

The term “over-the-air (OTA) client” includes any AV, or any electronicdevice (e.g., computer, controller, IoT device, electronic control unit(ECU)) that is embedded in, coupled to, or in communication with an AV.

The term “over-the-air (OTA) update” means any update, change, deletionor addition to software, firmware, data or configuration settings, orany combination thereof, that is delivered to an OTA client usingproprietary and/or standardized wireless communications technology,including but not limited to: cellular mobile communications (e.g., 2G,3G, 4G, 5G), radio wireless area networks (e.g., Wi-Fi) and/or satelliteInternet.

The term “edge node” means one or more edge devices coupled to a networkthat provide a portal for communication with AVs and can communicatewith other edge nodes and a cloud based computing platform, forscheduling and delivering OTA updates to OTA clients.

The term “edge device” means a device that implements an edge node andprovides a physical wireless access point (AP) into enterprise orservice provider (e.g., VERIZON, AT&T) core networks. Examples of edgedevices include but are not limited to: computers, controllers,transmitters, routers, routing switches, integrated access devices(IADs), multiplexers, metropolitan area network (MAN) and wide areanetwork (WAN) access devices.

“One or more” includes a function being performed by one element, afunction being performed by more than one element, e.g., in adistributed fashion, several functions being performed by one element,several functions being performed by several elements, or anycombination of the above.

It will also be understood that, although the terms first, second, etc.are, in some instances, used herein to describe various elements, theseelements should not be limited by these terms. These terms are only usedto distinguish one element from another. For example, a first contactcould be termed a second contact, and, similarly, a second contact couldbe termed a first contact, without departing from the scope of thevarious described embodiments. The first contact and the second contactare both contacts, but they are not the same contact.

The terminology used in the description of the various describedembodiments herein is for the purpose of describing particularembodiments only and is not intended to be limiting. As used in thedescription of the various described embodiments and the appendedclaims, the singular forms “a,” “an” and “the” are intended to includethe plural forms as well, unless the context clearly indicatesotherwise. It will also be understood that the term “and/or” as usedherein refers to and encompasses any and all possible combinations ofone or more of the associated listed items. It will be furtherunderstood that the terms “includes,” “including,” “comprises,” and/or“comprising,” when used in this description, specify the presence ofstated features, integers, steps, operations, elements, and/orcomponents, but do not preclude the presence or addition of one or moreother features, integers, steps, operations, elements, components,and/or groups thereof.

As used herein, the term “if” is, optionally, construed to mean “when”or “upon” or “in response to determining” or “in response to detecting,”depending on the context. Similarly, the phrase “if it is determined” or“if [a stated condition or event] is detected” is, optionally, construedto mean “upon determining” or “in response to determining” or “upondetecting [the stated condition or event]” or “in response to detecting[the stated condition or event],” depending on the context.

As used herein, an AV system refers to the AV along with the array ofhardware, software, stored data, and data generated in real-time thatsupports the operation of the AV. In an embodiment, the AV system isincorporated within the AV. In an embodiment, the AV system is spreadacross several locations. For example, some of the software of the AVsystem is implemented on a cloud computing environment similar to cloudcomputing environment 300 described below with respect to FIG. 3.

In general, this document describes technologies applicable to anyvehicles that have one or more autonomous capabilities including fullyautonomous vehicles, highly autonomous vehicles, and conditionallyautonomous vehicles, such as so-called Level 5, Level 4 and Level 3vehicles, respectively (see SAE International's standard J3016: Taxonomyand Definitions for Terms Related to On-Road Motor Vehicle AutomatedDriving Systems, which is incorporated by reference in its entirety, formore details on the classification of levels of autonomy in vehicles).The technologies described in this document are also applicable topartially autonomous vehicles and driver assisted vehicles, such asso-called Level 2 and Level 1 vehicles (see SAE International's standardJ3016: Taxonomy and Definitions for Terms Related to On-Road MotorVehicle Automated Driving Systems). In an embodiment, one or more of theLevel 1, 2, 3, 4 and 5 vehicle systems may automate certain vehicleoperations (e.g., steering, braking, and using maps) under certainoperating conditions based on processing of sensor inputs. Thetechnologies described in this document can benefit vehicles in anylevels, ranging from fully autonomous vehicles to human-operatedvehicles.

Autonomous vehicles have advantages over vehicles that require a humandriver. One advantage is safety. For example, in 2016, the United Statesexperienced 6 million automobile accidents, 2.4 million injuries, 40,000fatalities, and 13 million vehicles in crashes, estimated at a societalcost of $910+ billion. U.S. traffic fatalities per 100 million milestraveled have been reduced from about six to about one from 1965 to2015, in part due to additional safety measures deployed in vehicles.For example, an additional half second of warning that a crash is aboutto occur is believed to mitigate 60% of front-to-rear crashes. However,passive safety features (e.g., seat belts, airbags) have likely reachedtheir limit in improving this number. Thus, active safety measures, suchas automated control of a vehicle, are the likely next step in improvingthese statistics. Because human drivers are believed to be responsiblefor a critical pre-crash event in 95% of crashes, automated drivingsystems are likely to achieve better safety outcomes, e.g., by reliablyrecognizing and avoiding critical situations better than humans; makingbetter decisions, obeying traffic laws, and predicting future eventsbetter than humans; and reliably controlling a vehicle better than ahuman.

Referring to FIG. 1, an AV system 120 operates the vehicle 100 along atrajectory 198 through an environment 190 to a destination 199(sometimes referred to as a final location) while avoiding objects(e.g., natural obstructions 191, vehicles 193, pedestrians 192,cyclists, and other obstacles) and obeying rules of the road (e.g.,rules of operation or driving preferences).

In an embodiment, the AV system 120 includes devices 101 that areinstrumented to receive and act on operational commands from one or morecomputer processors 146. We use the term “operational command” to meanan executable instruction (or set of instructions) that causes a vehicleto perform an action (e.g., a driving maneuver). Operational commandscan, without limitation, including instructions for a vehicle to startmoving forward, stop moving forward, start moving backward, stop movingbackward, accelerate, decelerate, perform a left turn, and perform aright turn. In an embodiment, computer processor 146 is similar to theprocessor 304 described below in reference to FIG. 3. Examples ofdevices 101 include a steering control 102, brakes 103, gears,accelerator pedal or other acceleration control mechanisms, windshieldwipers, side-door locks, window controls, and turn-indicators.

In an embodiment, the AV system 120 includes sensors 121 for measuringor inferring properties of state or condition of the vehicle 100, suchas the AV's position, linear and angular velocity and acceleration, andheading (e.g., an orientation of the leading end of vehicle 100).Example of sensors 121 are GPS, inertial measurement units (IMU) thatmeasure both vehicle linear accelerations and angular rates, wheel speedsensors for measuring or estimating wheel slip ratios, wheel brakepressure or braking torque sensors, engine torque or wheel torquesensors, and steering angle and angular rate sensors.

In an embodiment, the sensors 121 also include sensors for sensing ormeasuring properties of the AV's environment. For example, the sensors121 include monocular or stereo video cameras 122 in the visible light,infrared or thermal (or both) spectra, LiDAR 123, RADAR, ultrasonicsensors, time-of-flight (TOF) depth sensors, speed sensors, temperaturesensors, humidity sensors, and precipitation sensors.

In an embodiment, the AV system 120 includes a data storage unit 142 andmemory 144 for storing machine instructions associated with computerprocessor 146 or data collected by sensors 121. In an embodiment, thedata storage unit 142 is similar to the ROM 308 or storage device 310described below in relation to FIG. 3. In an embodiment, memory 144 issimilar to the main memory 306 described below. In an embodiment, thedata storage unit 142 and memory 144 store historical, real-time, and/orpredictive information about the environment 190. In an embodiment, thestored information includes maps, driving performance, trafficcongestion updates or weather conditions. In an embodiment, datarelating to the environment 190 is transmitted to the vehicle 100 via acommunications channel from a remotely located database 134.

In an embodiment, the AV system 120 includes communications devices 140for communicating measured or inferred properties of other vehicles'states and conditions, such as positions, linear and angular velocities,linear and angular accelerations, and linear and angular headings to thevehicle 100. These devices include Vehicle-to-Vehicle (V2V) andVehicle-to-Infrastructure (V2I) communication devices and devices forwireless communications over point-to-point or ad hoc networks or both.In an embodiment, the communications devices 140 communicate across theelectromagnetic spectrum (including radio and optical communications) orother media (e.g., air and acoustic media). A combination ofVehicle-to-Vehicle (V2V) Vehicle-to-Infrastructure (V2I) communication(and, in some embodiments, one or more other types of communication) issometimes referred to as Vehicle-to-Everything (V2X) communication. V2Xcommunication typically conforms to one or more communications standardsfor communication with, between, and among autonomous vehicles.

In an embodiment, the communication devices 140 include communicationinterfaces. For example, wired, wireless, WiMAX, Wi-Fi, Bluetooth,satellite, cellular, optical, near field, infrared, or radio interfaces.The communication interfaces transmit data from a remotely locateddatabase 134 to AV system 120. In an embodiment, the remotely locateddatabase 134 is embedded in a cloud computing environment 200 asdescribed in FIG. 2. The communication devices 140 transmit datacollected from sensors 121 or other data related to the operation ofvehicle 100 to the remotely located database 134. In an embodiment,communication devices 140 transmit information that relates toteleoperations to the vehicle 100. In some embodiments, the vehicle 100communicates with other remote (e.g., “cloud”) servers 136.

In an embodiment, the remotely located database 134 also stores andtransmits digital data (e.g., storing data such as road and streetlocations). Such data is stored on the memory 144 on the vehicle 100, ortransmitted to the vehicle 100 via a communications channel from theremotely located database 134.

In an embodiment, the remotely located database 134 stores and transmitshistorical information about driving properties (e.g., speed andacceleration profiles) of vehicles that have previously traveled alongtrajectory 198 at similar times of day. In one implementation, such datamay be stored on the memory 144 on the vehicle 100, or transmitted tothe vehicle 100 via a communications channel from the remotely locateddatabase 134.

Computer processors 146 located on the vehicle 100 algorithmicallygenerate control actions based on both real-time sensor data and priorinformation, allowing the AV system 120 to execute its autonomousdriving capabilities.

In an embodiment, the AV system 120 includes computer peripherals 132coupled to computer processors 146 for providing information and alertsto, and receiving input from, a user (e.g., an occupant or a remoteuser) of the vehicle 100. In an embodiment, computer peripherals 132 aresimilar to the display 312, input device 314, and cursor controller 316discussed below in reference to FIG. 3. The coupling is wireless orwired. Any two or more of the interface devices may be integrated into asingle device.

In an embodiment, the AV system 120 receives and enforces a privacylevel of a passenger, e.g., specified by the passenger or stored in aprofile associated with the passenger. The privacy level of thepassenger determines how particular information associated with thepassenger (e.g., passenger comfort data, biometric data, etc.) ispermitted to be used, stored in the passenger profile, and/or stored onthe cloud server 136 and associated with the passenger profile. In anembodiment, the privacy level specifies particular informationassociated with a passenger that is deleted once the ride is completed.In an embodiment, the privacy level specifies particular informationassociated with a passenger and identifies one or more entities that areauthorized to access the information. Examples of specified entitiesthat are authorized to access information can include other AVs, thirdparty AV systems, or any entity that could potentially access theinformation.

A privacy level of a passenger can be specified at one or more levels ofgranularity. In an embodiment, a privacy level identifies specificinformation to be stored or shared. In an embodiment, the privacy levelapplies to all the information associated with the passenger such thatthe passenger can specify that none of her personal information isstored or shared. Specification of the entities that are permitted toaccess particular information can also be specified at various levels ofgranularity. Various sets of entities that are permitted to accessparticular information can include, for example, other AVs, cloudservers 136, specific third party AV systems, etc.

In an embodiment, the AV system 120 or the cloud server 136 determinesif certain information associated with a passenger can be accessed bythe vehicle 100 or another entity. For example, a third-party AV systemthat attempts to access passenger input related to a particularspatiotemporal location must obtain authorization, e.g., from the AVsystem 120 or the cloud server 136, to access the information associatedwith the passenger. For example, the AV system 120 uses the passenger'sspecified privacy level to determine whether the passenger input relatedto the spatiotemporal location can be presented to the third-party AVsystem, the vehicle 100, or to another AV. This enables the passenger'sprivacy level to specify which other entities are allowed to receivedata about the passenger's actions or other data associated with thepassenger.

FIG. 2 illustrates an example “cloud” computing environment. Cloudcomputing is a model of service delivery for enabling convenient,on-demand network access to a shared pool of configurable computingresources (e.g. networks, network bandwidth, servers, processing,memory, storage, applications, virtual machines, and services). Intypical cloud computing systems, one or more large cloud data centershouse the machines used to deliver the services provided by the cloud.Referring now to FIG. 2, the cloud computing environment 200 includescloud data centers 204 a, 204 b, and 204 c that are interconnectedthrough the cloud 202. Data centers 204 a, 204 b, and 204 c providecloud computing services to computer systems 206 a, 206 b, 206 c, 206 d,206 e, and 206 f connected to cloud 202.

The cloud computing environment 200 includes one or more cloud datacenters. In general, a cloud data center, for example the cloud datacenter 204 a shown in FIG. 2, refers to the physical arrangement ofservers that make up a cloud, for example the cloud 202 shown in FIG. 2,or a particular portion of a cloud. For example, servers are physicallyarranged in the cloud datacenter into rooms, groups, rows, and racks. Acloud datacenter has one or more zones, which include one or more roomsof servers. Each room has one or more rows of servers, and each rowincludes one or more racks. Each rack includes one or more individualserver nodes. In some implementation, servers in zones, rooms, racks,and/or rows are arranged into groups based on physical infrastructurerequirements of the datacenter facility, which include power, energy,thermal, heat, and/or other requirements. In an embodiment, the servernodes are similar to the computer system described in FIG. 3. The datacenter 204 a has many computing systems distributed through many racks.

The cloud 202 includes cloud data centers 204 a, 204 b, and 204 c alongwith the network and networking resources (for example, networkingequipment, nodes, routers, switches, and networking cables) thatinterconnect the cloud data centers 204 a, 204 b, and 204 c and helpfacilitate the computing systems' 206 a-f access to cloud computingservices. In an embodiment, the network represents any combination ofone or more local networks, wide area networks, or internetworks coupledusing wired or wireless links deployed using terrestrial or satelliteconnections. Data exchanged over the network, is transferred using anynumber of network layer protocols, such as Internet Protocol (IP),Multiprotocol Label Switching (MPLS), Asynchronous Transfer Mode (ATM),Frame Relay, etc. Furthermore, in embodiments where the networkrepresents a combination of multiple sub-networks, different networklayer protocols are used at each of the underlying sub-networks. In someembodiments, the network represents one or more interconnectedinternetworks, such as the public Internet.

The computing systems 206 a-f or cloud computing services consumers areconnected to the cloud 202 through network links and network adapters.In an embodiment, the computing systems 206 a-f are implemented asvarious computing devices, for example servers, desktops, laptops,tablet, smartphones, Internet of Things (IoT) devices, autonomousvehicles (including, cars, drones, shuttles, trains, buses, etc.) andconsumer electronics. In an embodiment, the computing systems 206 a-fare implemented in or as a part of other systems.

FIG. 3 illustrates a computer system 300. In an implementation, thecomputer system 300 is a special purpose computing device. Thespecial-purpose computing device is hard-wired to perform the techniquesor includes digital electronic devices such as one or moreapplication-specific integrated circuits (ASICs) or field programmablegate arrays (FPGAs) that are persistently programmed to perform thetechniques, or may include one or more general purpose hardwareprocessors programmed to perform the techniques pursuant to programinstructions in firmware, memory, other storage, or a combination. Suchspecial-purpose computing devices may also combine custom hard-wiredlogic, ASICs, or FPGAs with custom programming to accomplish thetechniques. In various embodiments, the special-purpose computingdevices are desktop computer systems, portable computer systems,handheld devices, network devices or any other device that incorporateshard-wired and/or program logic to implement the techniques.

In an embodiment, the computer system 300 includes a bus 302 or othercommunication mechanism for communicating information, and a hardwareprocessor 304 coupled with a bus 302 for processing information. Thehardware processor 304 is, for example, a general-purposemicroprocessor. The computer system 300 also includes a main memory 306,such as a random-access memory (RAM) or other dynamic storage device,coupled to the bus 302 for storing information and instructions to beexecuted by processor 304. In one implementation, the main memory 306 isused for storing temporary variables or other intermediate informationduring execution of instructions to be executed by the processor 304.Such instructions, when stored in non-transitory storage mediaaccessible to the processor 304, render the computer system 300 into aspecial-purpose machine that is customized to perform the operationsspecified in the instructions.

In an embodiment, the computer system 300 further includes a read onlymemory (ROM) 308 or other static storage device coupled to the bus 302for storing static information and instructions for the processor 304. Astorage device 310, such as a magnetic disk, optical disk, solid-statedrive, or three-dimensional cross point memory is provided and coupledto the bus 302 for storing information and instructions.

In an embodiment, the computer system 300 is coupled via the bus 302 toa display 312, such as a cathode ray tube (CRT), a liquid crystaldisplay (LCD), plasma display, light emitting diode (LED) display, or anorganic light emitting diode (OLED) display for displaying informationto a computer user. An input device 314, including alphanumeric andother keys, is coupled to bus 302 for communicating information andcommand selections to the processor 304. Another type of user inputdevice is a cursor controller 316, such as a mouse, a trackball, atouch-enabled display, or cursor direction keys for communicatingdirection information and command selections to the processor 304 andfor controlling cursor movement on the display 312. This input devicetypically has two degrees of freedom in two axes, a first axis (e.g.,x-axis) and a second axis (e.g., y-axis), that allows the device tospecify positions in a plane.

According to one embodiment, the techniques herein are performed by thecomputer system 300 in response to the processor 304 executing one ormore sequences of one or more instructions contained in the main memory306. Such instructions are read into the main memory 306 from anotherstorage medium, such as the storage device 310. Execution of thesequences of instructions contained in the main memory 306 causes theprocessor 304 to perform the process steps described herein. Inalternative embodiments, hard-wired circuitry is used in place of or incombination with software instructions.

The term “storage media” as used herein refers to any non-transitorymedia that store data and/or instructions that cause a machine tooperate in a specific fashion. Such storage media includes non-volatilemedia and/or volatile media. Non-volatile media includes, for example,optical disks, magnetic disks, solid-state drives, or three-dimensionalcross point memory, such as the storage device 310. Volatile mediaincludes dynamic memory, such as the main memory 306. Common forms ofstorage media include, for example, a floppy disk, a flexible disk, harddisk, solid-state drive, magnetic tape, or any other magnetic datastorage medium, a CD-ROM, any other optical data storage medium, anyphysical medium with patterns of holes, a RAM, a PROM, and EPROM, aFLASH-EPROM, NV-RAM, or any other memory chip or cartridge.

Storage media is distinct from but may be used in conjunction withtransmission media. Transmission media participates in transferringinformation between storage media. For example, transmission mediaincludes coaxial cables, copper wire and fiber optics, including thewires that comprise the bus 302. Transmission media can also take theform of acoustic or light waves, such as those generated duringradio-wave and infrared data communications.

In an embodiment, various forms of media are involved in carrying one ormore sequences of one or more instructions to the processor 304 forexecution. For example, the instructions are initially carried on amagnetic disk or solid-state drive of a remote computer. The remotecomputer loads the instructions into its dynamic memory and send theinstructions over a telephone line using a modem. A modem local to thecomputer system 300 receives the data on the telephone line and use aninfrared transmitter to convert the data to an infrared signal. Aninfrared detector receives the data carried in the infrared signal andappropriate circuitry places the data on the bus 302. The bus 302carries the data to the main memory 306, from which processor 304retrieves and executes the instructions. The instructions received bythe main memory 306 may optionally be stored on the storage device 310either before or after execution by processor 304.

The computer system 300 also includes a communication interface 318coupled to the bus 302. The communication interface 318 provides atwo-way data communication coupling to a network link 320 that isconnected to a local network 322. For example, the communicationinterface 318 is an integrated service digital network (ISDN) card,cable modem, satellite modem, or a modem to provide a data communicationconnection to a corresponding type of telephone line. As anotherexample, the communication interface 318 is a local area network (LAN)card to provide a data communication connection to a compatible LAN. Insome implementations, wireless links are also implemented. In any suchimplementation, the communication interface 318 sends and receiveselectrical, electromagnetic, or optical signals that carry digital datastreams representing various types of information.

The network link 320 typically provides data communication through oneor more networks to other data devices. For example, the network link320 provides a connection through the local network 322 to a hostcomputer 324 or to a cloud data center or equipment operated by anInternet Service Provider (ISP) 326. The ISP 326 in turn provides datacommunication services through the world-wide packet data communicationnetwork now commonly referred to as the “Internet” 328. The localnetwork 322 and Internet 328 both use electrical, electromagnetic oroptical signals that carry digital data streams. The signals through thevarious networks and the signals on the network link 320 and through thecommunication interface 318, which carry the digital data to and fromthe computer system 300, are example forms of transmission media. In anembodiment, the network 320 contains the cloud 202 or a part of thecloud 202 described above.

The computer system 300 sends messages and receives data, includingprogram code, through the network(s), the network link 320, and thecommunication interface 318. In an embodiment, the computer system 300receives code for processing. The received code is executed by theprocessor 304 as it is received, and/or stored in storage device 310, orother non-volatile storage for later execution.

Autonomous Vehicle Architecture

FIG. 4 shows an example architecture 400 for an autonomous vehicle(e.g., the vehicle 100 shown in FIG. 1). The architecture 400 includes aperception module 402 (sometimes referred to as a perception circuit), aplanning module 404 (sometimes referred to as a planning circuit), acontrol module 406 (sometimes referred to as a control circuit), alocalization module 408 (sometimes referred to as a localizationcircuit), and a database module 410 (sometimes referred to as a databasecircuit). Each module plays a role in the operation of the vehicle 100.Together, the modules 402, 404, 406, 408, and 410 may be part of the AVsystem 120 shown in FIG. 1. In some embodiments, any of the modules 402,404, 406, 408, and 410 is a combination of computer software (e.g.,executable code stored on a computer-readable medium) and computerhardware (e.g., one or more microprocessors, microcontrollers,application-specific integrated circuits [ASICs]), hardware memorydevices, other types of integrated circuits, other types of computerhardware, or a combination of any or all of these things). Each of themodules 402, 404, 406, 408, and 410 is sometimes referred to as aprocessing circuit (e.g., computer hardware, computer software, or acombination of the two). A combination of any or all of the modules 402,404, 406, 408, and 410 is also an example of a processing circuit.

In use, the planning module 404 receives data representing a destination412 and determines data representing a trajectory 414 (sometimesreferred to as a route) that can be traveled by the vehicle 100 to reach(e.g., arrive at) the destination 412. In order for the planning module404 to determine the data representing the trajectory 414, the planningmodule 404 receives data from the perception module 402, thelocalization module 408, and the database module 410.

The perception module 402 identifies nearby physical objects using oneor more sensors 121, e.g., as also shown in FIG. 1. The objects areclassified (e.g., grouped into types such as pedestrian, bicycle,automobile, traffic sign, etc.) and a scene description including theclassified objects 416 is provided to the planning module 404.

The planning module 404 also receives data representing the AV position418 from the localization module 408. The localization module 408determines the AV position by using data from the sensors 121 and datafrom the database module 410 (e.g., a geographic data) to calculate aposition. For example, the localization module 408 uses data from a GNSS(Global Navigation Satellite System) sensor and geographic data tocalculate a longitude and latitude of the AV. In an embodiment, dataused by the localization module 408 includes high-precision maps of theroadway geometric properties, maps describing road network connectivityproperties, maps describing roadway physical properties (such as trafficspeed, traffic volume, the number of vehicular and cyclist trafficlanes, lane width, lane traffic directions, or lane marker types andlocations, or combinations of them), and maps describing the spatiallocations of road features such as crosswalks, traffic signs or othertravel signals of various types. In an embodiment, the high-precisionmaps are constructed by adding data through automatic or manualannotation to low-precision maps.

The control module 406 receives the data representing the trajectory 414and the data representing the AV position 418 and operates the controlfunctions 420 a-c (e.g., steering, throttling, braking, ignition) of theAV in a manner that will cause the vehicle 100 to travel the trajectory414 to the destination 412. For example, if the trajectory 414 includesa left turn, the control module 406 will operate the control functions420 a-c in a manner such that the steering angle of the steeringfunction will cause the vehicle 100 to turn left and the throttling andbraking will cause the vehicle 100 to pause and wait for passingpedestrians or vehicles before the turn is made.

Autonomous Vehicle Inputs

FIG. 5 shows an example of inputs 502 a-d (e.g., sensors 121 shown inFIG. 1) and outputs 504 a-d (e.g., sensor data) that is used by theperception module 402 (FIG. 4). One input 502 a is a LiDAR (LightDetection and Ranging) system (e.g., LiDAR 123 shown in FIG. 1). LiDARis a technology that uses light (e.g., bursts of light such as infraredlight) to obtain data about physical objects in its line of sight. ALiDAR system produces LiDAR data as output 504 a. For example, LiDARdata is collections of 3D or 2D points (also known as a point clouds)that are used to construct a representation of the environment 190.

Another input 502 b is a RADAR system. RADAR is a technology that usesradio waves to obtain data about nearby physical objects. RADARs canobtain data about objects not within the line of sight of a LiDARsystem. A RADAR system 502 b produces RADAR data as output 504 b. Forexample, RADAR data are one or more radio frequency electromagneticsignals that are used to construct a representation of the environment190.

Another input 502 c is a camera system. A camera system uses one or morecameras (e.g., digital cameras using a light sensor such as acharge-coupled device [CCD]) to obtain information about nearby physicalobjects. A camera system produces camera data as output 504 c. Cameradata often takes the form of image data (e.g., data in an image dataformat such as RAW, JPEG, PNG, etc.). In some examples, the camerasystem has multiple independent cameras, e.g., for the purpose ofstereopsis (stereo vision), which enables the camera system to perceivedepth. Although the objects perceived by the camera system are describedhere as “nearby,” this is relative to the AV. In use, the camera systemmay be configured to “see” objects far, e.g., up to a kilometer or moreahead of the AV. Accordingly, the camera system may have features suchas sensors and lenses that are optimized for perceiving objects that arefar away.

Another input 502 d is a traffic light detection (TLD) system. A TLDsystem uses one or more cameras to obtain information about trafficlights, street signs, and other physical objects that provide visualnavigation information. A TLD system produces TLD data as output 504 d.TLD data often takes the form of image data (e.g., data in an image dataformat such as RAW, JPEG, PNG, etc.). A TLD system differs from a systemincorporating a camera in that a TLD system uses a camera with a widefield of view (e.g., using a wide-angle lens or a fish-eye lens) inorder to obtain information about as many physical objects providingvisual navigation information as possible, so that the vehicle 100 hasaccess to all relevant navigation information provided by these objects.For example, the viewing angle of the TLD system may be about 120degrees or more.

In some embodiments, outputs 504 a-d are combined using a sensor fusiontechnique. Thus, either the individual outputs 504 a-d are provided toother systems of the vehicle 100 (e.g., provided to a planning module404 as shown in FIG. 4), or the combined output can be provided to theother systems, either in the form of a single combined output ormultiple combined outputs of the same type (e.g., using the samecombination technique or combining the same outputs or both) ordifferent types type (e.g., using different respective combinationtechniques or combining different respective outputs or both). In someembodiments, an early fusion technique is used. An early fusiontechnique is characterized by combining outputs before one or more dataprocessing steps are applied to the combined output. In someembodiments, a late fusion technique is used. A late fusion technique ischaracterized by combining outputs after one or more data processingsteps are applied to the individual outputs.

FIG. 6 shows an example of a LiDAR system 602 (e.g., the input 502 ashown in FIG. 5). The LiDAR system 602 emits light 604 a-c from a lightemitter 606 (e.g., a laser transmitter). Light emitted by a LiDAR systemis typically not in the visible spectrum; for example, infrared light isoften used. Some of the light 604 b emitted encounters a physical object608 (e.g., a vehicle) and reflects back to the LiDAR system 602. (Lightemitted from a LiDAR system typically does not penetrate physicalobjects, e.g., physical objects in solid form.) The LiDAR system 602also has one or more light detectors 610, which detect the reflectedlight. In an embodiment, one or more data processing systems associatedwith the LiDAR system generates an image 612 representing the field ofview 614 of the LiDAR system. The image 612 includes information thatrepresents the boundaries 616 of a physical object 608. In this way, theimage 612 is used to determine the boundaries 616 of one or morephysical objects near an AV.

FIG. 7 shows the LiDAR system 602 in operation. In the scenario shown inthis figure, the vehicle 100 receives both camera system output 504 c inthe form of an image 702 and LiDAR system output 504 a in the form ofLiDAR data points 704. In use, the data processing systems of thevehicle 100 compares the image 702 to the data points 704. Inparticular, a physical object 706 identified in the image 702 is alsoidentified among the data points 704. In this way, the vehicle 100perceives the boundaries of the physical object based on the contour anddensity of the data points 704.

FIG. 8 shows the operation of the LiDAR system 602 in additional detail.As described above, the vehicle 100 detects the boundary of a physicalobject based on characteristics of the data points detected by the LiDARsystem 602. As shown in FIG. 8, a flat object, such as the ground 802,will reflect light 804 a-d emitted from a LiDAR system 602 in aconsistent manner. Put another way, because the LiDAR system 602 emitslight using consistent spacing, the ground 802 will reflect light backto the LiDAR system 602 with the same consistent spacing. As the vehicle100 travels over the ground 802, the LiDAR system 602 will continue todetect light reflected by the next valid ground point 806 if nothing isobstructing the road. However, if an object 808 obstructs the road,light 804 e-f emitted by the LiDAR system 602 will be reflected frompoints 810 a-b in a manner inconsistent with the expected consistentmanner. From this information, the vehicle 100 can determine that theobject 808 is present.

Path Planning

FIG. 9 shows a block diagram 900 of the relationships between inputs andoutputs of a planning module 404 (e.g., as shown in FIG. 4). In general,the output of a planning module 404 is a route 902 from a start point904 (e.g., source location or initial location), and an end point 906(e.g., destination or final location). The route 902 is typicallydefined by one or more segments. For example, a segment is a distance tobe traveled over at least a portion of a street, road, highway,driveway, or other physical area appropriate for automobile travel. Insome examples, e.g., if the vehicle 100 is an off-road capable vehiclesuch as a four-wheel-drive (4WD) or all-wheel-drive (AWD) car, SUV,pick-up truck, or the like, the route 902 includes “off-road” segmentssuch as unpaved paths or open fields.

In addition to the route 902, a planning module also outputs lane-levelroute planning data 908. The lane-level route planning data 908 is usedto traverse segments of the route 902 based on conditions of the segmentat a particular time. For example, if the route 902 includes amulti-lane highway, the lane-level route planning data 908 includestrajectory planning data 910 that the vehicle 100 can use to choose alane among the multiple lanes, e.g., based on whether an exit isapproaching, whether one or more of the lanes have other vehicles, orother factors that vary over the course of a few minutes or less.Similarly, in some implementations, the lane-level route planning data908 includes speed constraints 912 specific to a segment of the route902. For example, if the segment includes pedestrians or un-expectedtraffic, the speed constraints 912 may limit the vehicle 100 to a travelspeed slower than an expected speed, e.g., a speed based on speed limitdata for the segment.

In an embodiment, the inputs to the planning module 404 includesdatabase data 914 (e.g., from the database module 410 shown in FIG. 4),current location data 916 (e.g., the AV position 418 shown in FIG. 4),destination data 918 (e.g., for the destination 412 shown in FIG. 4),and object data 920 (e.g., the classified objects 416 as perceived bythe perception module 402 as shown in FIG. 4). In some embodiments, thedatabase data 914 includes rules used in planning. Rules are specifiedusing a formal language, e.g., using Boolean logic. In any givensituation encountered by the vehicle 100, at least some of the ruleswill apply to the situation. A rule applies to a given situation if therule has conditions that are met based on information available to thevehicle 100, e.g., information about the surrounding environment. Rulescan have priority. For example, a rule that says, “if the road is afreeway, move to the leftmost lane” can have a lower priority than “ifthe exit is approaching within a mile, move to the rightmost lane.”

FIG. 10 shows a directed graph 1000 used in path planning, e.g., by theplanning module 404 (FIG. 4). In general, a directed graph 1000 like theone shown in FIG. 10 is used to determine a path between any start point1002 and end point 1004. In real-world terms, the distance separatingthe start point 1002 and end point 1004 may be relatively large (e.g.,in two different metropolitan areas) or may be relatively small (e.g.,two intersections abutting a city block or two lanes of a multi-laneroad).

In an embodiment, the directed graph 1000 has nodes 1006 a-drepresenting different locations between the start point 1002 and theend point 1004 that could be occupied by a vehicle 100. In someexamples, e.g., when the start point 1002 and end point 1004 representdifferent metropolitan areas, the nodes 1006 a-d represent segments ofroads. In some examples, e.g., when the start point 1002 and the endpoint 1004 represent different locations on the same road, the nodes1006 a-d represent different positions on that road. In this way, thedirected graph 1000 includes information at varying levels ofgranularity. In an embodiment, a directed graph having high granularityis also a subgraph of another directed graph having a larger scale. Forexample, a directed graph in which the start point 1002 and the endpoint 1004 are far away (e.g., many miles apart) has most of itsinformation at a low granularity and is based on stored data, but alsoincludes some high granularity information for the portion of the graphthat represents physical locations in the field of view of the vehicle100.

The nodes 1006 a-d are distinct from objects 1008 a-b which cannotoverlap with a node. In an embodiment, when granularity is low, theobjects 1008 a-b represent regions that cannot be traversed byautomobile, e.g., areas that have no streets or roads. When granularityis high, the objects 1008 a-b represent physical objects in the field ofview of the vehicle 100, e.g., other automobiles, pedestrians, or otherentities with which the vehicle 100 cannot share physical space. In anembodiment, some or all of the objects 1008 a-b are a static objects(e.g., an object that does not change position such as a street lamp orutility pole) or dynamic objects (e.g., an object that is capable ofchanging position such as a pedestrian or other car).

The nodes 1006 a-d are connected by edges 1010 a-c. If two nodes 1006a-b are connected by an edge 1010 a, it is possible for a vehicle 100 totravel between one node 1006 a and the other node 1006 b, e.g., withouthaving to travel to an intermediate node before arriving at the othernode 1006 b. (When we refer to a vehicle 100 traveling between nodes, wemean that the vehicle 100 travels between the two physical positionsrepresented by the respective nodes.) The edges 1010 a-c are oftenbidirectional, in the sense that and vehicle 100 travels from a firstnode to a second node, or from the second node to the first node. In anembodiment, edges 1010 a-c are unidirectional, in the sense that anvehicle 100 can travel from a first node to a second node, however thevehicle 100 cannot travel from the second node to the first node. Edges1010 a-c are unidirectional when they represent, for example, one-waystreets, individual lanes of a street, road, or highway, or otherfeatures that can only be traversed in one direction due to legal orphysical constraints.

In an embodiment, the planning module 404 uses the directed graph 1000to identify a path 1012 made up of nodes and edges between the startpoint 1002 and end point 1004.

An edge 1010 a-c has an associated cost 1014 a-b. The cost 1014 a-b is avalue that represents the resources that will be expended if the vehicle100 chooses that edge. A typical resource is time. For example, if oneedge 1010 a represents a physical distance that is twice that as anotheredge 1010 b, then the associated cost 1014 a of the first edge 1010 amay be twice the associated cost 1014 b of the second edge 1010 b. Otherfactors that affect time include expected traffic, number ofintersections, speed limit, etc. Another typical resource is fueleconomy. Two edges 1010 a-b may represent the same physical distance,but one edge 1010 a may require more fuel than another edge 1010 b,e.g., because of road conditions, expected weather, etc.

When the planning module 404 identifies a path 1012 between the startpoint 1002 and end point 1004, the planning module 404 typically choosesa path optimized for cost, e.g., the path that has the least total costwhen the individual costs of the edges are added together.

Autonomous Vehicle Control

FIG. 11 shows a block diagram 1100 of the inputs and outputs of acontrol module 406 (e.g., as shown in FIG. 4). A control module operatesin accordance with a controller 1102 which includes, for example, one ormore processors (e.g., one or more computer processors such asmicroprocessors or microcontrollers or both) similar to processor 304,short-term and/or long-term data storage (e.g., memory random-accessmemory or flash memory or both) similar to main memory 306, ROM 1308,and storage device 210, and instructions stored in memory that carry outoperations of the controller 1102 when the instructions are executed(e.g., by the one or more processors).

In an embodiment, the controller 1102 receives data representing adesired output 1104. The desired output 1104 typically includes avelocity, e.g., a speed and a heading. The desired output 1104 can bebased on, for example, data received from a planning module 404 (e.g.,as shown in FIG. 4). In accordance with the desired output 1104, thecontroller 1102 produces data usable as a throttle input 1106 and asteering input 1108. The throttle input 1106 represents the magnitude inwhich to engage the throttle (e.g., acceleration control) of an vehicle100, e.g., by engaging the steering pedal, or engaging another throttlecontrol, to achieve the desired output 1104. In some examples, thethrottle input 1106 also includes data usable to engage the brake (e.g.,deceleration control) of the vehicle 100. The steering input 1108represents a steering angle, e.g., the angle at which the steeringcontrol (e.g., steering wheel, steering angle actuator, or otherfunctionality for controlling steering angle) of the AV should bepositioned to achieve the desired output 1104.

In an embodiment, the controller 1102 receives feedback that is used inadjusting the inputs provided to the throttle and steering. For example,if the vehicle 100 encounters a disturbance 1110, such as a hill, themeasured speed 1112 of the vehicle 100 is lowered below the desiredoutput speed. In an embodiment, any measured output 1114 is provided tothe controller 1102 so that the necessary adjustments are performed,e.g., based on the differential 1113 between the measured speed anddesired output. The measured output 1114 includes measured position1116, measured velocity 1118, (including speed and heading), measuredacceleration 1120, and other outputs measurable by sensors of thevehicle 100.

In an embodiment, information about the disturbance 1110 is detected inadvance, e.g., by a sensor such as a camera or LiDAR sensor, andprovided to a predictive feedback module 1122. The predictive feedbackmodule 1122 then provides information to the controller 1102 that thecontroller 1102 can use to adjust accordingly. For example, if thesensors of the vehicle 100 detect (“see”) a hill, this information canbe used by the controller 1102 to prepare to engage the throttle at theappropriate time to avoid significant deceleration.

FIG. 12 shows a block diagram 1200 of the inputs, outputs, andcomponents of the controller 1102. The controller 1102 has a speedprofiler 1202 which affects the operation of a throttle/brake controller1204. For example, the speed profiler 1202 instructs the throttle/brakecontroller 1204 to engage acceleration or engage deceleration using thethrottle/brake 1206 depending on, e.g., feedback received by thecontroller 1102 and processed by the speed profiler 1202.

The controller 1102 also has a lateral tracking controller 1208 whichaffects the operation of a steering controller 1210. For example, thelateral tracking controller 1208 instructs the steering controller 1204to adjust the position of the steering angle actuator 1212 depending on,e.g., feedback received by the controller 1102 and processed by thelateral tracking controller 1208.

The controller 1102 receives several inputs used to determine how tocontrol the throttle/brake 1206 and steering angle actuator 1212. Aplanning module 404 provides information used by the controller 1102,for example, to choose a heading when the vehicle 100 begins operationand to determine which road segment to traverse when the vehicle 100reaches an intersection. A localization module 408 provides informationto the controller 1102 describing the current location of the vehicle100, for example, so that the controller 1102 can determine if thevehicle 100 is at a location expected based on the manner in which thethrottle/brake 1206 and steering angle actuator 1212 are beingcontrolled. In an embodiment, the controller 1102 receives informationfrom other inputs 1214, e.g., information received from databases,computer networks, etc.

Device Provisioning and Authentication

FIG. 13 shows an example of an electronic device 1300 that is acomponent in a vehicle and provisioned using the techniques disclosedherein. In this context, provisioning a device in a vehicle refers toproviding the device with one or more cryptographic keys or securitycertificates, or both, such that the device can perform authenticatedcommunication with other entities in the vehicle, or with externalentities (for example, remote servers) in the enterprise, as describedpreviously. The device 1300 includes one or more computer processors,such as processor 1302; local storage, such as memory storage unit 1304;a security module 1306; and a communications network interface 1306. Theprocessor 1302 executes instructions stored in the local storage toimplement a device provisioning API 1310 and a device management API1312. As noted previously, the provisioning API 1310 initiates theprovisioning of the device 1300 by communicating with the provisioningservice of the enterprise. The device management API 1312 is used tomanage firmware and configuration updates of the device 1300.

In some embodiments, the device 1300 is an example of a component devicein the vehicle 100 (FIG. 1). For example, in some cases, the device 1300is one of the sensors 121 in the vehicle 100, such as one of monocularor stereo video cameras 122, infrared or thermal (or both) spectra,LiDAR 123, RADAR, ultrasonic sensors, time-of-flight (TOF) depthsensors, speed sensors, temperature sensors, humidity sensors, orprecipitation sensors. In some cases, the device 1300 is some otherelectronic component of the vehicle 100, such as one of computerprocessor 146, communications devices 140, data storage unit 142, memory144, or devices 101 (e.g., one of steering control 102 or brakes 103,among others).

The device 1300 uses the provisioning techniques disclosed herein togenerate a public-private key pair and obtain a digital certificate,e.g., when the device is initially deployed in the vehicle. The digitalcertificate or security certificate certifies the ownership of thepublic key by the device, which is the named subject of the certificate.The certificate allows other entities to rely upon signatures or onassertions made by the device about the private key that corresponds tothe certified public key. For example, when the device 1300 sends amessage signed with the private key (which is known only to the device),the recipient can verify the authenticity of the message (e.g., that themessage was indeed signed by the device) by performing cryptographicauthentication operations on the message signature using the public keyobtained from the certificate. Since the certificate binds the device'sidentity to the public key, successful verification of the messagesignature using the public key verifies that the device had signed themessage.

In some embodiments, the device 1300, at a time subsequent to itsinitial provisioning, uses the reprovisioning techniques disclosedherein to update its public-private key pair and obtain a new digitalcertificate. As part of the provisioning or reprovisioning, the device1300 also obtains intermediate CA digital certificates corresponding toa device authority of the enterprise or a device administrator authorityof the enterprise, or both. The device 1300 uses its digital certificateto authenticate itself to other devices in the vehicle, or to otherentities outside the vehicle (e.g., computer peripherals 132 or cloudserver 136), during communication with these other devices or entities.The device 1300 uses the intermediate CA digital certificate(s) toauthenticate the digital certificates of the other devices or entitiesduring such communication.

In some embodiments, the device 1300 uses the security module 1306 tosecurely generate its public-private key pair, or to store its privatekey, or both. In some embodiments, the private key never leaves thesecurity module 1306. As described previously, in some embodiments, thesecurity module 1306 is a trusted platform module (TPM) or a hardwaresecurity module (HSM). In this context, a TPM or a HSM is a specializedchip that safeguards and manages digital keys, performs encryption anddecryption functions for digital signatures, strong authentication andother cryptographic functions. The TPM or HSM generates thepublic-private key pair and stores the keys and/or other securityinformation specific to the host system for hardware authentication.

The one or more other devices or entities with which the device 1300communicates for provisioning, reprovisioning, or authenticatedcommunication in some embodiments, include servers and devicesassociated with the enterprise that is also associated with the vehiclein which the device 1300 is deployed. In this context, “associated with”refers to owned, operated, or managed by, or any combination of these.As described previously, in some embodiments, the enterprise isassociated with a plurality of vehicles, including the vehicle in whichthe device 1300 is deployed.

FIG. 14 shows an example of a system 1400 for provisioning andauthenticated communication of an electronic device 1402 that is acomponent in a vehicle, using the techniques disclosed herein. Thesystem 1400 includes, apart from the electronic device 1402, aprovisioning service 1404, a certificate authority 1406, and an entityfor authenticated communication 1408. In some embodiments, the system1400 optionally includes a provisioning local proxy service 1404 a thatis a proxy for the provisioning service 1404 and is positioned in localproximity to the device 1402. In some embodiments, the system 1400includes an enterprise remote center 1410, which is associated with theenterprise and includes the provisioning service 1404 or the certificateauthority 1406, or both.

In some embodiments, the device 1402 is an example of the device 1300.For example, in some cases, the device 1402 is one of the sensors 121 inthe vehicle 100, such as one of monocular or stereo video cameras 122,infrared or thermal (or both) spectra, LiDAR 123, RADAR, ultrasonicsensors, time-of-flight (TOF) depth sensors, speed sensors, temperaturesensors, humidity sensors, or precipitation sensors. In some cases, thedevice 1402 is some other electronic component of the vehicle 100, suchas one of computer processor 146, communications devices 140, datastorage unit 142, memory 144, or devices 101 (e.g., one of steeringcontrol 102 or brakes 103, among others). The following sectionsaccordingly describe, without loss of generality, functions andoperations of the device 1402 with respect to the device componentsdescribed for the device 1300.

In some embodiments, the device 1402 is configured with a unique,non-modifiable identity, e.g., at the time of the device manufacture.For example, the identity can be a device serial number. As anotherexample, the identity can be a combination of a device manufacturer name(or unique manufacturer number) and a device serial number. This isuseful, for example, in cases where different manufacturers producedevices having the same serial number.

In some embodiments, a digital certificate associated with theenterprise's root CA is installed in the device 1402, prior to thedevice 1402 being provisioned. For example, the enterprise can provideits root CA certificate to the device manufacturer, which includes theroot CA certificate in firmware installed in the device 1402 (andpotentially installed in other devices as well from the manufacturer)prior to delivering the device 1402 to the enterprise.

In some embodiments, the provisioning service 1404 is implemented on oneor more servers associated with the enterprise. Similarly, thecertificate authority 1406 is implemented on one or more serversassociated with the enterprise. In some embodiments, the certificateauthority 1406 represents a device authority associated with theenterprise that is used to authenticate devices. Additionally oralternatively, in some embodiments, the certificate authority 1406represents a device administrator authority associated with theenterprise that is used to authenticate entities (e.g., entity 1408,which can be a manifest server) that reconfigure devices or updatedevice firmware. In some embodiments, the certificate authority acts asan intermediate CA that generates digital certificates for the device1402, or for the entity 1408, or both. In some embodiments, theprovisioning service 1404 or the certificate authority 1406, or both,are located in a remote centralized location of the enterprise, e.g., inan enterprise datacenter.

In some embodiments, the system 1400 includes a root CA associated withthe enterprise that is used as the root of the authentication chain oftrust for the enterprise. For example, in such cases, a public key ofthe root CA is known to all devices and entities associated with theenterprise (e.g., the public key is preinstalled in the devices andentities at the time of deployment for operations in the enterprise).

The device 1402 communicates with the provisioning service 1404 toobtain a digital certificate. In some embodiments, the device 1402communicates directly with the provisioning service 1404 using a networkconnection established through the network interface in the device 1402(e.g., similar to network interface 1308 in embodiments where the device1402 is similar to the device 1300). In some embodiments, the device1402 communicates with a provisioning local proxy 1404 a that serves asa frontend to the provisioning service 1404 and is positioned proximateto the vehicle in which the device 1402 is deployed. For example, theprovisioning local proxy 1404 a can be implemented in a technician'slaptop that is coupled (e.g., through a wired or wireless connection) tothe processors in the vehicle.

In some embodiments, communications between the device 1402 and theentity 1408 is authenticated using respective digital certificates. Thiscan be useful, for example, to verify that only entities 1408 authorizedby the enterprise (e.g., a manifest server) can reconfigure the device1402, or that only devices associated with the enterprise can beconfigured with functionality provided by the enterprise, or both.Communication by the device 1402, for provisioning and/orauthentication, with one or more of the provisioning service 1404, thecertificate authority 1406, or the entity 1408, among others, aredescribed in the following sections with reference to the messagesequence diagrams FIGS. 15A-15C.

FIGS. 15A, 15B and 15C show examples of message sequence diagrams 1500A,1500B and 1500C, respectively, associated with provisioning anelectronic device that is a component in a vehicle, using the techniquesdisclosed herein. In some embodiments, the message sequence diagrams1500A, 1500B and 1500C represent exchange of communication between oneor more of the device 1402, the provisioning service 1404, and thecertificate authority 1406. In such embodiments, in the FIGS. 15A-15C,the device 1502 is similar to the device 1402; the provisioning service1504 is similar to the provisioning service 1404; and the enterprise CA1506 is similar to the certificate authority 1406. Accordingly, thedescriptions of the message sequence diagrams 1500A, 1500B and 1500Cinclude references to the system 1400. The message sequence diagrams1500A, 1500B and 1500C also include communication exchange with otherentities in the enterprise system, such as device induction station1512, and enterprise management service 1514.

The message sequence diagram 1500A in FIG. 15A shows exchange ofcommunication between the provisioning service 1504 and a deviceinduction station 1512 associated with the enterprise. In someembodiments, the communication shown in the message sequence diagram1500A takes place when a component device of a vehicle, e.g., device1502, is inducted, e.g., initially deployed, in the enterprise. This canbe the case, for example, when the device 1502 is received by theenterprise for installation as a component in a vehicle associated withthe enterprise.

As shown in FIG. 15A, when the component device is received at theenterprise (e.g., from the manufacturer or vendor), device inductionstation 1512 captures the device identity, e.g., by reading the deviceserial number (1522) by scanning or manually entering the serial numberin a web interface. In some embodiments, the device induction station1512 is part of a tracking system of the enterprise. As notedpreviously, in some embodiments, the device identity is a combination ofthe device manufacturer name (or some other identifying information,such as a unique manufacturer number) and device serial number.

After capturing the device identity, the device induction station 1512sends a notification to the provisioning service 1506 that a new devicehas been inducted (1524). The notification includes the device identity,e.g., the device serial number, determined by the device inductionstation 1512. The provisioning service 1506 records the device identityin a database of active devices used in vehicles associated with theenterprise, e.g., by adding the device serial number as a record in thedatabase (1526).

Following installation in a vehicle, when the device is first powered upand booted, the device (e.g., a processor in the device) determines thatthe device does not have a digital certificate. Upon making thisdetermination, the device enables the provisioning API, whichestablishes a communication with the provisioning service of theenterprise.

The message sequence diagram 1500B in FIG. 15B shows exchange ofcommunication between the device 1502, provisioning service 1504 andenterprise CA 1506. In some embodiments, the communication shown in themessage sequence diagram 1500B takes place when device 1502 isprovisioned for use in the enterprise, e.g., by generating acryptographic public-private key pair and obtaining a digitalcertificate that securely binds the device identity to the public key ofthe key pair. The key pair and the corresponding certificate aresubsequently used by the device 1502 for authenticated communicationwith other devices or entities associated with the enterprise, where theauthenticated communication involves the use of security protocols,described herein.

As shown in FIG. 15B, when the device 1502 boots up, the device checkswhether it has valid credentials (1522). For example, the device 1502checks whether it has a current key pair (e.g., stored in the securitymodule 1306) and a corresponding digital certificate that has notexpired or been revoked. If the device determines that it has validcredentials, then the device performs normal startup (1524). Forexample, the device 1502 completes boot up without running its deviceprovisioning API 1310 and proceeds to perform regular functions, such assensor data collection, firmware update, or reconfiguration, amongothers. In some embodiments, the regular functions involve authenticatedcommunication with other devices or entities in the vehicle in which thedevice is deployed, or with external devices or entities associated withthe enterprise.

If the device 1502 determines that the device does not have a validcredentials, then the device enables its device provisioning API (1526).This can be the case, for example, when the device is first powered upand booted for the first time following installation in the vehicle, orthe enterprise CA 1506 has revoked the device's digital certificate,such that the device 1502 has to be reprovisioned. A communicationconnection is established between the device provisioning API and theprovisioning service 1504 (1528). The device 1502 authenticates theprovisioning service 1504 (1530). For example, in some embodiments, theprovisioning service 1504 sends its digital certificate to the device1502, which authenticates the provisioning service's certificate using achallenge-response mechanism and the root CA certificate that ispre-configured in the device 1502. The authentication can involvesecurity protocols such as a Transport Layer Security (TLS) protocol ora Needham-Schroeder protocol. As a general detailed example, in someembodiments, the device 1502 obtains the signature of the root CA thatis included in the provisioning service's certificate; determines thepublic key of the root CA from the root CA certificate; and verifies,using the public key, that the signature of the root CA included in theprovisioning service's certificate is indeed signed by the root CA. Thedevice then sends a cryptographic challenge to the provisioning service1504, to which the provisioning service sends a response that is signedusing the provisioning service's private key. The device 1502 verifiesthe signature in the response using the public key of the provisioningservice 1504 that is obtained from the provisioning service'scertificate. If the signature is verified, then the provisioning service1504 is successfully authenticated.

Once the provisioning service 1504 is successfully authenticated, theprovisioning service 1504 sends instructions to the device 1502, whichcommands the device to generate a key pair (1532). Upon receiving thecommand, the device 1502 (e.g., the security module 1306 in the device)generates a public-private key pair, and also generates a certificatesigning request (CSR) (1534). The CSR includes the public key of the keypair, while the private key of the key pair is stored securely in thesecure storage of the device, e.g., within the security module 1306. Thedevice 1502 then sends the CSR to the provisioning service 1504 as aresponse to the key generation command (1536).

Upon receiving the CSR from the device 1502, the provisioning service1504 checks to confirm that the device's identity is present in a recordin the database of active devices, or that the device 1502 is notalready provisioned, or both. If the checks are successful, theprovisioning service 1504 sends the device CSR to the enterprise CA 1506(1538). As noted previously, in some embodiments, the enterprise CA is adevice authority server.

Upon receiving the CSR, the device authority server generates a digitalcertificate for the device. The digital certificate, which is signed bythe private key of the enterprise CA 1506, binds the device's identityto the public key of the device, which the enterprise CA obtains fromthe CSR. The enterprise CA 1506 then sends a response to theprovisioning service 1504 (1540). The response includes the generateddigital certificate for the device. In some embodiments, the responsealso includes one or more intermediate CA certificates, e.g., a digitalcertificate for the enterprise CA 1506, or for a device authority server(if distinct from the enterprise CA 1506), or for a device administratorserver, or any suitable combination of these. In some embodiments, thedigital certificate for the device, or the intermediate CA certificates,or both, are x509 certificates. However, other certificate formats arealso possible. For example, in some embodiments, the digital certificatefor the device, or the intermediate CA certificates, or both, are Simplepublic key infrastructure (SPKI) certificates. In some embodiments, thedigital certificate for the device, or the intermediate CA certificates,or both, are OpenPGP certificates.

The provisioning service 1504 records the device certificate receivedfrom the enterprise CA 1506 (1542). For example, in some embodiments,the provisioning service stores a local copy of the device certificate,linking the local copy to the record of the device identity stored inthe database. The provisioning service 1504 then forwards the devicecertificate and the one or more intermediate CA certificates to thedevice 1502 (1544).

The device 1502 authenticates the one or more intermediate CAcertificates using the root CA certificate that is pre-configured on thedevice. Upon successfully authenticating the intermediate CAcertificates, the device 1502 obtains the public key of the enterpriseCA 1506 from the corresponding enterprise CA certificate, and thenauthenticates the device certificate generated by the enterprise CA 1506using the public key of the enterprise CA, following standardcertificate authentication protocols. Upon successful authentication,the device 1502 stores its digital certificate and the one or moreintermediate CA certificates in storage memory coupled to the device(1546). The device 1502 is now provisioned for authenticatedcommunication in the enterprise environment.

The message sequence diagram 1500C in FIG. 15C shows exchange ofcommunication between the device 1502, provisioning service 1504 andenterprise management service 1514. In some embodiments, thecommunication shown in the message sequence diagram 1500C takes placewhen the enterprise management service 1514 deprovisions device 1502,e.g., by revoking the device's digital certificate. This can be thecase, for example, when the device's keys have been compromised, or tofollow enterprise policy that requires devices and entities in theenterprise to refresh their keys and digital certificates from time totime, to enhance security. If the device 1502 remains in the enterprisesystem for use subsequent to the deprovisioning, the device 1502 isreprovisioned as described with respect to the message sequence diagram1500A in FIG. 15A. In some embodiments, the communication shown in themessage sequence diagram 1500C takes place when the enterprisemanagement service 1514 decommissions device 1502, e.g., by revoking thedevice's digital certificate. This can be the case, for example, whendevice 1502 reaches the end of its service life. In such cases,following the decommissioning, the device 1502 is removed from regularuse in the enterprise system. The following sections describe themessage sequence diagram 1500C with reference to deprovisioning device1502. However, it is to be understood that the message sequence diagram1500C is similarly applicable to decommissioning device 1502.

To deprovision device 1502, management service 1514 sends a deprovisioncommand (1552) to the provisioning service 1504, with the deprovisioncommand including the device identity (e.g., device serial number). Insome embodiments, the management service 1514 represents one or moremanagement servers of the enterprise (e.g., located at the enterpriseremote center 1410). Upon receiving the deprovision command, theprovisioning service 1504 deletes the device digital certificate that isstored by the provisioning service with the device identity (1554). Insome embodiments, the provisioning service 1504 also moves the device'sidentity record from its database of active device records to a databaseof retired device records.

The management service 1514 also establishes a connection with thedevice 1502. The device 1502 and the management service mutuallyauthenticate each other (1558). For example, in some embodiments, themanagement service 1514 sends its digital certificate to the device1502, and the device 1502 and the management service authenticate oneanother using the other's digital certificate and a challenge-responsemechanism, as described previously.

Following mutual authentication, the management service sends adeprovision command to the device (1560). Upon receiving the deprovisioncommand, device management API in the device 1502 (e.g., devicemanagement API 1312) deletes its existing digital certificate and thepublic-private key pair that are stored in the device, e.g., in securitymodule 1306 of the device (1562). In some embodiments, the devicemanagement API also deletes the enterprise CA digital certificates thatwere stored by the device. The device management API then resets thesecurity module, e.g., by resetting one or more cryptographic countersthat are used for key generation, performing garbage collection in thesecurity module memory, among other suitable functions.

Example Processes for Device Provisioning and Authentication

FIG. 16 shows an example process 1600 for provisioning an electronicdevice that is a component in a vehicle associated with an enterprise.In some embodiments, the process 1600 is performed by the device 1402that is deployed in a vehicle associated with an enterprise to obtainsecurity credentials (e.g., public-private key pair or digitalcertificate) for authenticated communication with other devices andentities that are associated with the enterprise system. Accordingly,the process 1600 is described in the following sections with respect tothe device 1402 and the system 1400. However, the process 1600 can alsobe performed by other devices. As described previously, in someembodiments, the device 1402 is similar to the device 1300. Accordingly,in describing the process 1600, hardware components and functions of thedevice 1402 are described with reference to the hardware components andfunctions of the device 1300.

In the process 1600, upon booting up, the device checks whether validsecurity credentials are present in the device (1602). For example, thedevice 1402 checks whether it has a current key pair (e.g., stored inthe security module 1306) and a corresponding digital certificate thathas not expired or been revoked.

If the device determines that it has valid security credentials, thenthe device performs regular startup and authenticated communicationusing the existing security credentials (1604). For example, the device1402 completes boot up without running its device provisioning API(e.g., device provisioning API 1310) and proceeds to perform regularfunctions, such as sensor data collection, firmware update,reconfiguration, among others. The device 1402 also performsauthenticated communication, using the existing valid devicecertificate, with other devices or entities (e.g., entity 1408) in thevehicle in which the device is deployed, or with external devices orentities associated with the enterprise. For example, the device 1402performs authenticated communication with a manifest server that sendscommands and data to reconfigure the device 1402, or to update thedevice firmware.

On the other hand, if the device determines that it does not have avalid security credentials, then the device launches its deviceprovisioning API and establishes a connection with a provisioningservice (1606). For example, when the device 1402 is powered up andbooted for the first time following installation in the vehicle, or thedevice's existing digital certificate has been revoked or has expired,then the device 1402 determines that it does not have valid securitycredentials, and that the device has to be provisioned (or reprovisionedif the digital certificate has been revoked or has expired). The device1402 launches its device provisioning API (e.g., device provisioning API1310) and sends a connection request to one or more network serversassociated with the enterprise that are running the provisioning service1404, which accordingly establishes a connection with the deviceprovisioning API running on the device 1402. As described previously, insome embodiments, the device 1402 establishes a connection with a localproxy for the provisioning service, e.g., provisioning local proxy 1404a, which then establishes a connection with the remote network servershosting the provisioning service 1404 in the enterprise remote center1410. In some embodiments, the device 1402 establishes the connectiondirectly with a remote network server hosting the provisioning service1404 in the enterprise remote center 1410.

The device authenticates the provisioning service (1608). For example,the provisioning service 1404 network server sends a digital certificatecorresponding to the provisioning service 1404 to the device 1402, whichauthenticates the provisioning service's certificate using achallenge-response mechanism and the root CA certificate that ispre-configured in the device 1402, in a manner as described previously.

If the device cannot successfully authenticate the provisioning servicebased on the service's digital certificate, then the device aborts theconnection and restarts the process 1600, attempting to connect to theprovisioning service again. On the other hand, if the devicesuccessfully authenticates the provisioning service, then the devicereceives key generation instructions from the provisioning service(1610). For example, when the provisioning service 1404 is successfullyauthenticated, the provisioning service 1404 sends instructions to thedevice 1402, which commands the device to generate a key pair. In someembodiments, the instructions are received at the device via theprovisioning service local proxy, e.g., provisioning service local proxy1404 a.

The device generates a public-private key pair (1612). For example, uponreceiving the key generation command from the provisioning service 1404,the device 1402 (e.g., the security module 1306 in the device) generatesa public-private key pair. In some embodiments, the key pair isgenerated using RSA encryption algorithm, or ECC. In some embodiments,the key pair is generated ElGamal algorithm, Digital Signature Standard(DSS), Cramer-Shoup cryptosystem, Paillier cryptosystem, or YAKauthenticated key agreement protocol, among other suitable algorithms.The device 1402 stores the private key securely within the device, e.g.,in security module 1306.

The device generates a certificate signing request (CSR) (1614). Forexample, in addition to generating a key pair, the device 1402 generatesa CSR, which includes the public key of the key pair, and the identityof the device (e.g., device serial number, or a combination of devicemanufacturer name or number and device serial number).

The device sends the CSR to the provisioning service (1616). Forexample, the device 1402 sends the CSR to the provisioning service 1404as a response to the key generation instructions. In some embodiments,the device 1402 sends the CSR to the provisioning local proxy 1404 a,which forwards the CSR to the remote network server(s) hosting theprovisioning service 1404.

The device receives a device certificate and/or enterprise CAcertificate from the provisioning service (1618). For example, uponreceiving the CSR from the device 1402, the provisioning service 1404checks whether the device's identity is present in a record in thedatabase of active devices, or whether the device 1402 is alreadyprovisioned (e.g., the device already has valid credentials, such as adigital certificate), or both. If the checks indicate that the device'sidentity is recorded, and that the device does not have validcredentials, then the provisioning service 1404 sends the device CSR tothe enterprise CA 1406. Upon receiving the CSR, the enterprise CA 1406generates a digital certificate for the device, and sends to theprovisioning service 1404 a response, which includes the generateddigital certificate for the device and one or more intermediate CAcertificates. As described previously, in some embodiments, the digitalcertificate for the device, or the intermediate CA certificates, orboth, are x509 certificates. In some embodiments, the digitalcertificate for the device, or the intermediate CA certificates, orboth, are SPKI certificates, or OpenPGP certificates. The provisioningservice 1404 records the device certificate received from the enterpriseCA 1406, and then forwards the device certificate and the one or moreintermediate CA certificates to the device 1402.

The device authenticates the one or more intermediate CA certificatesusing a root CA certificate (1620). For example, the device 1402 obtainsthe one or more intermediate CA certificates from the message receivedfrom the provisioning service 1404, and verifies the authenticity ofthese certificates using the root CA public key that is pre-configuredon the device.

If the device cannot successfully verify the authenticity of one or moreintermediate CA certificates, then the device aborts the provisioningprocess. In some embodiments, the device restarts the process 1600,attempting to connect to the provisioning service again. On the otherhand, if the device successfully authenticates the intermediate CAcertificates, then the device authenticates the device certificate usingthe authenticated CA certificate (1622). For example, upon successfullyauthenticating the intermediate CA certificates, the device 1402 obtainsthe public key of the enterprise CA 1406 from the correspondingenterprise CA certificate, and then authenticates the device certificategenerated by the enterprise CA 1406 using the public key of theenterprise CA, following standard certificate authentication protocols.

If the device cannot successfully verify the authenticity of the devicedigital certificate, then the device aborts the provisioning process. Insome embodiments, the device restarts the process 1600, attempting toconnect to the provisioning service again. On the other hand, if thedevice successfully authenticates the device certificate, then thedevice stores the authenticated device certificate in memory and usesthe device certificate for authenticated communication with enterpriseentities (1624). For example, upon successfully authenticating thedevice digital certificate, the device 1402 stores its digitalcertificate and the one or more intermediate CA certificates in storagememory coupled to the device (e.g., in storage 1304 or security module1306). The device 1402 is now provisioned for authenticatedcommunication in the enterprise environment, using the existing validdevice certificate. For example, the device 1402 performs authenticatedcommunication with other devices or entities (e.g., entity 1408) in thevehicle in which the device is deployed, or with external devices orentities associated with the enterprise.

FIG. 17 shows an example process 1700 for provisioning an electronicdevice that is a component in a vehicle associated with an enterprise.In some embodiments, the process 1700 is performed by the provisioningservice 1404 associated with the enterprise, to facilitate provision ofsecurity credentials (e.g., public-private key pair or digitalcertificate) to a device 1402 that is deployed in a vehicle associatedwith the enterprise. Accordingly, the process 1700 is described in thefollowing sections with respect to the provisioning service 1404 and thesystem 1400. However, the process 1700 can also be performed by otherentities in the enterprise system.

In the process 1700, the provisioning service establishes a networkconnection with a device provisioning API (1702). For example, a networkserver running the provisioning service 1404 receives a connectionrequest from the device provisioning API (e.g., device provisioning API1310) running on the device 1402. In response to the connection request,the provisioning service 1404 establishes a connection with the deviceprovisioning API running on the device 1402. As described previously, insome embodiments, the communication/connection between the device 1402and the provisioning service 1404 is through a provisioning local proxy1404 a.

The provisioning service sends its digital certificate to the device(1704). For example, once the connection is established with the device1402, the provisioning service 1404 sends a digital certificatecorresponding to the provisioning service to the device provisioning APIrunning on the device 1402.

The provisioning service determines whether the authentication issuccessful (1706). For example, the device 1402 authenticates theprovisioning service's certificate using a challenge-response mechanism,in a manner as described previously.

If the authentication is not successful, then the process is aborted(1708). For example, if the device 1402 cannot successfully authenticatethe provisioning service 1404 based on the service's digitalcertificate, then the device aborts the connection, and provisioningservice 1404 closes the connection to the device 1402.

On the other hand, if the authentication is successful, then theprovisioning service sends key generation instructions to the device(1710). For example, when the provisioning service 1404 is successfullyauthenticated, the provisioning service 1404 sends instructions to thedevice 1402, which commands the device to generate a key pair. In someembodiments, the instructions are sent to the provisioning service localproxy, e.g., provisioning service local proxy 1404 a, which forwards theinstructions to the device 1402.

The provisioning service receives a certificate signing request (CSR)from the device (1712). For example, upon receiving the key generationinstructions from the provisioning service 1404, the device 1402generates a public-private key pair and a CSR, which includes the publickey and the identity of the device. The device 1402 sends the CSR to theprovisioning service 1404. In some embodiments, the device 1402 sendsthe CSR to the provisioning local proxy 1404 a, which forwards the CSRto the remote network server(s) hosting the provisioning service 1404.

The provisioning service determines if the device is registered (1714).For example, upon receiving the CSR from the device 1402, theprovisioning service 1404 checks whether the device's identity ispresent in a record in the database of active devices.

If the provisioning service determines that the device is notregistered, then the provisioning service aborts (1716). For example, ifthe provisioning service 1404 cannot find the device 1402 recorded inits database of active devices, then the provisioning service 1404rejects the CSR and aborts the provisioning. In some embodiments, theprovisioning service 1404 generates an audit log entry to note that aprovisioning attempt was made from an unregistered device. This can bethe case, for example, when an unauthorized device attempts to obtainvalid credentials from the enterprise.

On the other hand, if the provisioning service determines that thedevice is registered, then the provisioning service further checkswhether the device has an existing valid certificate (1718). Forexample, upon determining that the device 1402 is registered, theprovisioning service 1404 further checks whether the device 1402 isalready provisioned, e.g., the device 1402 already has a valid digitalcertificate.

If the check indicates that the device has an existing certificate, thenthe provisioning service aborts (1719). For example, if the provisioningservice 1404 determines that a valid digital certificate for the device1402 is recorded in its database, indicating that the device 1402 isalready provisioned, then the provisioning service 1404 rejects the CSRfrom the device 1402 and aborts the provisioning. In some embodiments,the provisioning service 1404 takes further action to resolve thediscrepancy. For example, the provisioning service can notify anadministrator to de-provision the device 1402 by revoking the devicecertificate. In some embodiments, the provisioning service 1404generates an alert to notify a conflicting provisioning request. Thismight be the case, for example, when an unauthorized device attempted tospoof an authorized device, such that both the authorized device and theunauthorized device requested provisioning.

On the other hand, if the check (1718) indicates that the provisioningservice does not have valid credentials, then the provisioning servicesends the device CSR to a signing certificate authority (1720). Forexample, if the provisioning service 1404 determines that the device1402 is registered but does not have a valid digital certificate, thenthe provisioning service 1404 sends the CSR from the device 1402 to theenterprise CA 1406.

The provisioning service receives a device certificate and one or moreCA certificates from the signing CA (1722). For example, the enterpriseCA 1406 generates a digital certificate for the device 1402 uponreceiving the CSR from the provisioning service 1404, and sends aresponse to the provisioning service 1404. The response includes thegenerated digital certificate for the device 1402 and one or moreintermediate CA certificates. As described previously, the digitalcertificate for the device, or the intermediate CA certificates, orboth, can be x509 certificates, SPKI certificates, or OpenPGPcertificates.

The provisioning service stores a copy of the device certificate inlocal storage (1724). For example, upon receiving the response from theenterprise CA 1406, the provisioning service 1404 makes a copy of thedevice certificate for local storage. In some embodiments, theprovisioning service 1404 links the local copy to the record for thedevice 1402 that is in the database of active devices.

The provisioning service sends the device certificate and the one ormore CA certificates to the device (1726). For example, the provisioningservice 1404 forwards the device certificate and the one or moreintermediate CA certificates that are received from the enterprise CA1406, to the device 1402. In some embodiments, the provisioning service1404 sends the certificates to the provisioning local proxy 1404 a,which forwards the certificates to the device 1402. The device 1402stores the certificates as described with respect to the process 1600.

FIG. 18 shows an example process 1800 for changing the provisioningstatus of an electronic device that is a component in a vehicleassociated with an enterprise. In some embodiments, the process 1800 isperformed by the device 1402 that is deployed in a vehicle associatedwith an enterprise to reprovision the device, e.g., obtain refreshedsecurity credentials (e.g., public-private key pair or digitalcertificate) for authenticated communication with other devices andentities that are associated with the enterprise system. In someembodiments, the process 1800 is performed by the device 1402 when thedevice is decommissioned, e.g., removed from service in the enterprisesystem. Accordingly, the process 1800 is described in the followingsections with respect to the device 1402 and the system 1400. However,the process 1800 can also be performed by other devices. As describedpreviously, in some embodiments, the device 1402 is similar to thedevice 1300. Accordingly, in describing the process 1800, hardwarecomponents and functions of the device 1402 are described with referenceto the hardware components and functions of the device 1300.

The process 1800 starts when the device establishes a network connectionwith the management service (1802). For example, the device managementAPI in the device 1402 (e.g., device management API 1312) receives aconnection request from a management service associated with theenterprise (e.g., management service 1514). In some embodiments, themanagement service represents one or more management servers of theenterprise (e.g., located at the enterprise remote center 1410). In someembodiments, a server running the management service sends theconnection request.

The device receives a digital certificate corresponding to themanagement service (1806). For example, upon establishing the connectionwith the device 1402, the management service and the device 1402mutually authenticate each other. For the mutual authentication, themanagement service sends its digital certificate to the device 1402. Insome embodiments, the device 1402 also sends its digital certificate tothe management service.

The device determines if authentication is successful (1806). Forexample, the device 1402 and the management service authenticate oneanother using the other's digital certificate and a challenge-responsemechanism, as described previously.

If the authentication is not successful, then the process is aborted(1808). For example, if the device 1402 cannot successfully authenticatethe management service based on the service's digital certificate, thenthe device aborts. Alternatively, if the management service cannotsuccessfully authenticate the device 1402 based on the device's digitalcertificate, then the management service aborts.

On the other hand, if authentication is successful, then the devicereceives instructions from the provisioning service (1810). For example,following successful mutual authentication, the management service sendsinstructions to the device 1402. In some embodiments, the instructionsinclude a deprovision command. In some embodiments, the instructionsinclude a decommissioning command.

The device deletes existing device certificate and key pair (1812). Forexample, upon receiving the deprovision command (or decommissioncommand, as applicable), device management API in the device 1402 (e.g.,device management API 1312) deletes its existing digital certificate andthe public-private key pair that are stored in the device, e.g., insecurity module 1306 of the device. In some embodiments, the devicemanagement API also deletes the enterprise CA digital certificates thatare stored by the device.

Optionally, in some embodiments, the device performs reboot andreprovisioning (1814). This is the case, for example, when the process1800 is used to reprovision the device. In such embodiments, followingdeleting the existing device certificate and key pair (1812) in responseto receiving the deprovision command from the management service (1810),the device management API resets the security module (e.g., securitymodule 1306) and reboots the device. For example, the device managementAPI resets one or more cryptographic counters in the security modulethat are used for key generation, performing garbage collection in thesecurity module memory, among other suitable functions. The device 1402is then rebooted; when the device 1402 is power back up, the deviceproceeds to reprovision, e.g., generate a new public-private key pairand obtain a digital certificate, as described previously with respectto the process 1600.

In the foregoing description, embodiments of the invention have beendescribed with reference to numerous specific details that may vary fromimplementation to implementation. The description and drawings are,accordingly, to be regarded in an illustrative rather than a restrictivesense. The sole and exclusive indicator of the scope of the invention,and what is intended by the applicants to be the scope of the invention,is the literal and equivalent scope of the set of claims that issue fromthis application, in the specific form in which such claims issue,including any subsequent correction. Any definitions expressly set forthherein for terms contained in such claims shall govern the meaning ofsuch terms as used in the claims. In addition, when we use the term“further comprising,” in the foregoing description or following claims,what follows this phrase can be an additional step or entity, or asub-step/sub-entity of a previously-recited step or entity.

What is claimed is:
 1. A method performed by a device in a vehicle, themethod comprising: determining, using at least one processor, whetherone or more valid security credentials are available in a storagecommunicatively coupled to the device upon powering up the device; inresponse to determining that one or more valid security credentials arenot available, establishing, using a transceiver and the at least oneprocessor, a communication session with a network server that isconfigured to manage provisioning of devices corresponding to anenterprise associated with the vehicle, wherein establishing thecommunication session includes authenticating, using the at least oneprocessor, the network server by using an enterprise securitycertificate of the enterprise that is available to the device; uponestablishing the communication session with the network server,receiving, from the network server using the at least one processor,instructions to generate cryptographic keys; in response to receivingthe instructions, generating, using the at least one processor, a keypair comprising a public key and a corresponding private key; storing,using the at least one processor, the private key in the storagecommunicatively coupled to the device; sending, to the network serverusing the at least one processor, a certificate signing request thatincludes the public key and an identifier of the device; receiving, fromthe network server using the at least one processor, at least one of adevice security certificate corresponding to the public key, or asecurity certificate of a signing certificate authority that signed thedevice security certificate, wherein the signing certificate authorityis associated with the enterprise; authenticating, using the at leastone processor, the security certificate of the signing certificateauthority using the enterprise security certificate available to thedevice; and upon successfully authenticating the security certificate ofthe signing certificate authority, storing, using the at least oneprocessor, at least one of the device security certificate or thesecurity certificate of the signing certificate authority in the storagecommunicatively coupled to the device.
 2. The method of claim 1, whereinprovisioning a particular device in the vehicle comprises providing theparticular device with at least one cryptographic key or securitycertificate, wherein the particular device is configured to performauthenticated communication with at least one other entity associatedwith the enterprise using the at least one cryptographic key or securitycertificate.
 3. The method of claim 1, further comprising: receiving,using the network server, the certificate signing request from thedevice; determining, using the network server, whether the certificatesigning request is a valid request; in response to determining that thecertificate signing request is a valid request, sending, using thenetwork server, the certificate signing request to the signingcertificate authority; receiving, using the network server from thesigning certificate authority, at least one of the device securitycertificate, or the security certificate of the signing certificateauthority; storing, using the network server, the device securitycertificate in storage coupled to the network server; and sending, usingthe network server to the device, at least one of the device securitycertificate, or the security certificate of the signing certificateauthority.
 4. The method of claim 3, wherein determining whether thecertificate signing request is a valid request comprises: obtaining theidentifier of the device from the certificate signing request;determining, using the identifier, whether the device is registered withthe enterprise as an active device; upon determining that the device isregistered with the enterprise as an active device, determining whetheran existing device security certificate is available to the networkserver; and upon determining that an existing device securitycertificate is not available to the network server, determining that thecertificate signing request is a valid request.
 5. The method of claim4, further comprising: determining that the certificate signing requestis not a valid request upon determining that the device is notregistered with the enterprise as an active device; and in response todetermining that the device is not registered with the enterprise as anactive device: generating an audit log entry, and terminating thecommunication session with the device.
 6. The method of claim 4, furthercomprising: determining that the certificate signing request is not avalid request upon determining that an existing device securitycertificate is available to the network server; and in response todetermining that an existing device security certificate is available tothe network server: revoking the existing device security certificate,generating an audit log entry, and terminating the communication sessionwith the device.
 7. The method of claim 1, further comprising:receiving, from a management service corresponding to the enterprise, aconnection request; authenticating the management service using theenterprise security certificate of the enterprise; upon successfullyauthenticating the management service, establishing the connection withthe management service; receiving, from the management service,instructions to deprovision the device; and in response to receiving theinstructions to deprovision the device: deleting, from the storagecommunicatively coupled to the device, at least one of the devicesecurity certificate or the security certificate of the signingcertificate authority, and rebooting the device.
 8. The method of claim7, further comprising: receiving, using the signing certificateauthority from the management service, instructions to deprovision thedevice, the instructions including the identifier of the device; and inresponse to receiving the instructions to deprovision the device,revoking, by the signing certificate authority, the device securitycertificate.
 9. The method of claim 8, further comprising: receiving,using the network server from the management service, instructions todeprovision the device, the instructions including the identifier of thedevice and revocation information for the device security certificate;in response to receiving the instructions to deprovision the device,determining, by the network server using the identifier of the deviceobtained from the instructions, the device security certificate fromstorage coupled to the network server; and deleting, using the networkserver, the device security certificate from the storage coupled to thenetwork server.
 10. The method of claim 1, further comprising:receiving, using the network server from a management servicecorresponding to the enterprise, instructions to decommission thedevice, the instructions including the identifier of the device andrevocation information for the device security certificate; in responseto receiving the instructions to decommission the device, determining,by the network server using the identifier of the device obtained fromthe instructions, the device security certificate from storage coupledto the network server; deleting, using the network server, the devicesecurity certificate from the storage coupled to the network server; andrecording, using the network server, the identifier of the device ascorresponding to a decommissioned device.
 11. The method of claim 1,further comprising: receiving, from a management service correspondingto the enterprise, a connection request; authenticating the managementservice using the enterprise security certificate of the enterprise;upon successfully authenticating the management service, establishingthe connection with the management service; receiving, from themanagement service, instructions to update a configuration of thedevice; and in response to receiving the instructions to update aconfiguration of the device, performing a configuration updateoperation, the configuration update operation comprising one ofreconfiguring the device, or updating a firmware on the device.
 12. Themethod of claim 11, wherein authenticating the management servicecomprises performing a mutual authentication between the device and themanagement service using one of Transport Layer Security (TLS) orNeedham-Schroeder protocol.
 13. A system comprising: a device in avehicle, the device comprising: at least one processor; and storagemedia storing instructions that, when executed, cause the at least oneprocessor to perform operations comprising: determining whether one ormore valid security credentials are available in a storagecommunicatively coupled to the device upon powering up the device; inresponse to determining that one or more valid security credentials arenot available, establishing, using a transceiver, a communicationsession with a network server that is configured to manage provisioningof devices corresponding to an enterprise associated with the vehicle,wherein establishing the communication session includes authenticating,using the processor, the network server by using an enterprise securitycertificate of the enterprise that is available to the device; uponestablishing the communication session with the network server,receiving, from the network server, instructions to generatecryptographic keys; in response to receiving the instructions,generating, using the processor, a key pair comprising a public key anda corresponding private key; storing the private key in the storagecommunicatively coupled to the device; sending, to the network server, acertificate signing request that includes the public key and anidentifier of the device; receiving, from the network server, at leastone of a device security certificate corresponding to the public key, ora security certificate of a signing certificate authority that signedthe device security certificate, wherein the signing certificateauthority is associated with the enterprise; authenticating, using theprocessor, the security certificate of the signing certificate authorityusing the enterprise security certificate available to the device; andupon successfully authenticating the security certificate of the signingcertificate authority, storing at least one of the device securitycertificate or the security certificate of the signing certificateauthority in the storage communicatively coupled to the device.
 14. Thesystem of claim 13, wherein provisioning a particular device in thevehicle comprises providing the particular device with at least onecryptographic key or security certificate, wherein the particular deviceis configured to perform authenticated communication with at least oneother entity associated with the enterprise using the at least onecryptographic key or security certificate.
 15. The system of claim 13,further comprising: the network server, wherein the network servercomprises: one or more server processors; and storage media storinginstructions that, when executed, cause the one or more serverprocessors to perform operations comprising: receiving the certificatesigning request from the device; determining whether the certificatesigning request is a valid request; in response to determining that thecertificate signing request is a valid request, sending the certificatesigning request to the signing certificate authority; receiving, fromthe signing certificate authority, at least one of the device securitycertificate, or the security certificate of the signing certificateauthority; storing the device security certificate in storage coupled tothe network server; and sending, to the device, at least one of thedevice security certificate, or the security certificate of the signingcertificate authority.
 16. The system of claim 15, wherein determiningwhether the certificate signing request is a valid request comprises:obtaining the identifier of the device from the certificate signingrequest; determining, using the identifier, whether the device isregistered with the enterprise as an active device; upon determiningthat the device is registered with the enterprise as an active device,determining whether an existing device security certificate is availableto the network server; and upon determining that an existing devicesecurity certificate is not available to the network server, determiningthat the certificate signing request is a valid request.
 17. The systemof claim 16, wherein the operations performed by the one or more serverprocessors further comprise: determining that the certificate signingrequest is not a valid request upon determining that the device is notregistered with the enterprise as an active device; and in response todetermining that the device is not registered with the enterprise as anactive device: generating an audit log entry, and terminating thecommunication session with the device.
 18. The system of claim 16,wherein the operations performed by the one or more server processorsfurther comprise: determining that the certificate signing request isnot a valid request upon determining that an existing device securitycertificate is available to the network server; and in response todetermining that an existing device security certificate is available tothe network server: revoking the existing device security certificate,generating an audit log entry, and terminating the communication sessionwith the device.
 19. The system of claim 13, wherein the operationsperformed by the one or more device processors further comprise:receiving, from a management service corresponding to the enterprise, aconnection request; authenticating the management service using theenterprise security certificate of the enterprise; upon successfullyauthenticating the management service, establishing the connection withthe management service; receiving, from the management service,instructions to deprovision the device; and in response to receiving theinstructions to deprovision the device: deleting, from the storagecommunicatively coupled to the device, at least one of the devicesecurity certificate or the security certificate of the signingcertificate authority, and rebooting the device.
 20. The system of claim19, further comprising: the signing certificate authority, wherein thesigning certificate authority comprises: one or more certificateauthority processors; and storage media storing instructions that, whenexecuted, cause the one or more certificate authority processors toperform operations comprising: receiving, from the management service,instructions to deprovision the device, the instructions including theidentifier of the device; and in response to receiving the instructionsto deprovision the device, revoking the device security certificate. 21.The system of claim 20, wherein the operations performed by the one ormore server processors further comprise: receiving, from the managementservice, instructions to deprovision the device, the instructionsincluding the identifier of the device and revocation information forthe device security certificate; in response to receiving theinstructions to deprovision the device, determining, using theidentifier of the device obtained from the instructions, the devicesecurity certificate from storage coupled to the network server; anddeleting the device security certificate from the storage coupled to thenetwork server.
 22. The system of claim 13, further comprising: thenetwork server, wherein the network server comprises: one or more serverprocessors; and storage media storing instructions that, when executed,cause the one or more server processors to perform operationscomprising: receiving, from a management service corresponding to theenterprise, instructions to decommission the device, the instructionsincluding the identifier of the device and revocation information forthe device security certificate; in response to receiving theinstructions to decommission the device, determining, using theidentifier of the device obtained from the instructions, the devicesecurity certificate from storage coupled to the network server;deleting the device security certificate from the storage coupled to thenetwork server; and recording the identifier of the device ascorresponding to a decommissioned device.
 23. The system of claim 13,wherein the operations further comprise: receiving, from a managementservice corresponding to the enterprise, a connection request;authenticating the management service using the enterprise securitycertificate of the enterprise; upon successfully authenticating themanagement service, establishing the connection with the managementservice; receiving, from the management service, instructions to updatea configuration of the device; and in response to receiving theinstructions to update a configuration of the device, performing aconfiguration update operation, the configuration update operationcomprising one of reconfiguring the device, or updating a firmware onthe device.
 24. The system of claim 23, wherein authenticating themanagement service comprises performing a mutual authentication betweenthe device and the management service using one of Transport LayerSecurity (TLS) or Needham-Schroeder protocol.
 25. The system of claim13, wherein the storage communicatively coupled to the device comprisesone or more of a trusted platform module (TPM), or a hardware securitymodule (HSM).
 26. The system of claim 13, wherein at least one of thedevice security certificate or the security certificate of the signingcertificate authority comprises a X.509 certificate.
 27. A vehiclecomprising: a device comprising circuitry to execute one or moreinstructions that, when executed, cause the device to perform operationscomprising: determining, using a processor, whether one or more validsecurity credentials are available in a storage communicatively coupledto the device upon powering up the device; in response to determiningthat one or more valid security credentials are not available,establishing, using a transceiver, a communication session with anetwork server that is configured to manage provisioning of devicescorresponding to an enterprise associated with the vehicle, whereinestablishing the communication session includes authenticating, usingthe processor, the network server by using an enterprise securitycertificate of the enterprise that is available to the device, andwherein provisioning a particular device in the vehicle refers toproviding the particular device with at least one cryptographic key orsecurity certificate, wherein the particular device performsauthenticated communication with at least one other entity associatedwith the enterprise using the at least one cryptographic key or securitycertificate; upon establishing the communication session with thenetwork server, receiving, from the network server, instructions togenerate cryptographic keys; in response to receiving the instructions,generating, using the processor, a key pair comprising a public key anda corresponding private key; storing the private key in the storagecommunicatively coupled to the device; sending, to the network server, acertificate signing request that includes the public key and anidentifier of the device; receiving, from the network server, at leastone of a device security certificate corresponding to the public key, ora security certificate of a signing certificate authority that signedthe device security certificate, wherein the signing certificateauthority is associated with the enterprise; authenticating, using theprocessor, the security certificate of the signing certificate authorityusing the enterprise security certificate available to the device; andupon successfully authenticating the security certificate of the signingcertificate authority, storing at least one of the device securitycertificate or the security certificate of the signing certificateauthority in the storage communicatively coupled to the device.