SECURE VEHICLE TO VEHICLE PTC COMMUNICATION

A computer-implemented method is provided that includes obtaining a first secret and a first public key, and obtaining a second secret a second public key. The method may also include authenticating the first public key of the first vehicle based on a first private key associated with the first vehi...

Full description

Saved in:
Bibliographic Details
Main Authors Gawne, Kendrick, Vrba, Matthew Steven, Woo, Derek K, Craven, Stephen, Smith, Keith, Grimm, Ann K, Gorman, Joseph W, Staats, Andrew Ryan, Morris, Irwin, Barr, Stuart J, Struttmann, Shannon K, Kuchar, Edward J, Lucas, James, Sollars, Scott, Burgart, Phillip A, Dreasher, Rebecca W, Chapman, Jerrid D, Hausmann, Adam, Kernwein, Jeffrey D, Pretorius, Francois P, Green, Craig K, Lindsley, Tania, Tripathy, Janmejay, Oswald, James Allen
Format Patent
LanguageEnglish
Published 03.02.2022
Subjects
Online AccessGet full text

Cover

Loading…
More Information
Summary:A computer-implemented method is provided that includes obtaining a first secret and a first public key, and obtaining a second secret a second public key. The method may also include authenticating the first public key of the first vehicle based on a first private key associated with the first vehicle, and authenticating the second public key of the second vehicle based on a second private key associated with the second vehicle. The method may also include preventing a man-in-the-middle attack, by securing at least one of a first vehicle-to-central office communication, a central office-to-first vehicle communication, or a first vehicle-to-second vehicle, wherein the first vehicle-to-central office communication and the central office-to-first vehicle communication are authenticated based on a determined private key associated with a respective first vehicle on-board computer, and sending a message, with the central office server, to a vehicle associated with a conditional movement authority.
Bibliography:Application Number: US202117504086