SECURE VEHICLE TO VEHICLE PTC COMMUNICATION
A computer-implemented method is provided that includes obtaining a first secret and a first public key, and obtaining a second secret a second public key. The method may also include authenticating the first public key of the first vehicle based on a first private key associated with the first vehi...
Saved in:
Main Authors | , , , , , , , , , , , , , , , , , , , , , , , |
---|---|
Format | Patent |
Language | English |
Published |
03.02.2022
|
Subjects | |
Online Access | Get full text |
Cover
Loading…
Summary: | A computer-implemented method is provided that includes obtaining a first secret and a first public key, and obtaining a second secret a second public key. The method may also include authenticating the first public key of the first vehicle based on a first private key associated with the first vehicle, and authenticating the second public key of the second vehicle based on a second private key associated with the second vehicle. The method may also include preventing a man-in-the-middle attack, by securing at least one of a first vehicle-to-central office communication, a central office-to-first vehicle communication, or a first vehicle-to-second vehicle, wherein the first vehicle-to-central office communication and the central office-to-first vehicle communication are authenticated based on a determined private key associated with a respective first vehicle on-board computer, and sending a message, with the central office server, to a vehicle associated with a conditional movement authority. |
---|---|
Bibliography: | Application Number: US202117504086 |