×

Secure communication with a traffic control system

  • US 10,094,901 B1
  • Filed: 02/05/2018
  • Issued: 10/09/2018
  • Est. Priority Date: 06/13/2017
  • Status: Active Grant
First Claim
Patent Images

1. A computer-implemented method comprising:

  • receiving, by a processor, an indication from a radio frequency identification (RFID) device that a mobile device is in a predetermined area, wherein the mobile device contains a public decryption key, and wherein the public decryption key is obtained from a regulatory entity;

    sending, by the processor, a private key on a first frequency at a first time to the mobile device, the private key verifying an identity of a controller, wherein the controller is maintained by the regulatory entity, and wherein the first frequency is within a first frequency range of 3 kHz to 300 GHz;

    receiving, by the processor and in response to sending the private key on the first frequency, a communication request from the mobile device to communicate with the controller on the first frequency;

    establishing, via the processor, a communication connection between the mobile device and the controller on the first frequency;

    sending, from the controller, encrypted configuration information and encrypted state information to the mobile device, wherein the encrypted configuration information includes a physical location of the RFID device and the encrypted state information includes an indication of a length of time of a sensor in relation to the physical location of the RFID device;

    receiving, by the processor, a second indication from the RFID device that a second mobile device is in the predetermined area, wherein the second mobile device contains the public decryption key;

    sending, by the processor, the private key on a second frequency at the first time to the second mobile device, wherein the second frequency is within a second frequency range of 2402 MHz to 2480 MHz;

    receiving, by the processor and in response to sending the private key on the second frequency, a second communication request from the second mobile device to communicate with the controller on the second frequency;

    establishing, via the processor, a second communication connection between the second mobile device and the controller on the second frequency;

    sending, from the controller, the encrypted configuration information and the encrypted state information to the second mobile device;

    sending, by the processor, the private key on the first frequency and the second frequency at a second time;

    identifying, by a third mobile device, that the private key is being sent on the first frequency, wherein the third mobile device contains the public decryption key;

    receiving, by the processor and in response to sending the private key on the first frequency and the second frequency at the second time, a third communication request from the third mobile device to communicate with the controller on the first frequency;

    establishing, via the processor, a third communication connection between the third mobile device and the controller on the first frequency; and

    sending, from the controller, the encrypted configuration information and the encrypted state information to the third mobile device.

View all claims
  • 2 Assignments
Timeline View
Assignment View
    ×
    ×