Secure vehicle to vehicle PTC communication

A computer-implemented method is provided that includes obtaining a first secret and a first public key, and obtaining a second secret a second public key. The method may also include authenticating the first public key of the first vehicle based on a first private key associated with the first vehi...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Hauptverfasser: Gawne, Kendrick, Vrba, Matthew Steven, Woo, Derek K, Craven, Stephen, Smith, Keith, Grimm, Ann K, Gorman, Joseph W, Staats, Andrew Ryan, Morris, Irwin, Barr, Stuart J, Struttmann, Shannon K, Kuchar, Edward J, Lucas, James, Sollars, Scott, Burgart, Phillip A, Dreasher, Rebecca W, Chapman, Jerrid D, Hausmann, Adam, Kernwein, Jeffrey D, Pretorius, Francois P, Green, Craig K, Lindsley, Tania, Tripathy, Janmejay, Oswald, James Allen
Format: Patent
Sprache:eng
Schlagworte:
Online-Zugang:Volltext bestellen
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
Beschreibung
Zusammenfassung:A computer-implemented method is provided that includes obtaining a first secret and a first public key, and obtaining a second secret a second public key. The method may also include authenticating the first public key of the first vehicle based on a first private key associated with the first vehicle, and authenticating the second public key of the second vehicle based on a second private key associated with the second vehicle. The method may also include preventing a man-in-the-middle attack, by securing at least one of a first vehicle-to-central office communication, a central office-to-first vehicle communication, or a first vehicle-to-second vehicle, wherein the first vehicle-to-central office communication and the central office-to-first vehicle communication are authenticated based on a determined private key associated with a respective first vehicle on-board computer, and sending a message, with the central office server, to a vehicle associated with a conditional movement authority.