Secure communication with a traffic control system
First Claim
1. A computer-implemented method comprising:
- receiving, by a processor, an indication from a radio frequency identification (RFID) device that a mobile device is in a predetermined area, wherein the mobile device contains a public decryption key, and wherein the public decryption key is obtained from a regulatory entity;
sending, by the processor, a private key on a first frequency at a first time to the mobile device, the private key verifying an identity of a controller, wherein the controller is maintained by the regulatory entity, and wherein the first frequency is within a first frequency range of 3 kHz to 300 GHz;
receiving, by the processor and in response to sending the private key on the first frequency, a communication request from the mobile device to communicate with the controller on the first frequency;
establishing, via the processor, a communication connection between the mobile device and the controller on the first frequency;
sending, from the controller, encrypted configuration information and encrypted state information to the mobile device, wherein the encrypted configuration information includes a physical location of the RFID device and the encrypted state information includes an indication of a length of time of a sensor in relation to the physical location of the RFID device;
receiving, by the processor, a second indication from the RFID device that a second mobile device is in the predetermined area, wherein the second mobile device contains the public decryption key;
sending, by the processor, the private key on a second frequency at the first time to the second mobile device, wherein the second frequency is within a second frequency range of 2402 MHz to 2480 MHz;
receiving, by the processor and in response to sending the private key on the second frequency, a second communication request from the second mobile device to communicate with the controller on the second frequency;
establishing, via the processor, a second communication connection between the second mobile device and the controller on the second frequency;
sending, from the controller, the encrypted configuration information and the encrypted state information to the second mobile device;
sending, by the processor, the private key on the first frequency and the second frequency at a second time;
identifying, by a third mobile device, that the private key is being sent on the first frequency, wherein the third mobile device contains the public decryption key;
receiving, by the processor and in response to sending the private key on the first frequency and the second frequency at the second time, a third communication request from the third mobile device to communicate with the controller on the first frequency;
establishing, via the processor, a third communication connection between the third mobile device and the controller on the first frequency; and
sending, from the controller, the encrypted configuration information and the encrypted state information to the third mobile device.
2 Assignments
0 Petitions
Accused Products
Abstract
A processor may receive an indication form a radio frequency identification (RFID) device that a mobile device is in a predetermined area. The processor may send a private key on a first frequency at a first time to the mobile device. The processor may receive a communication request from the mobile device that may contain a public decryption key. The processor may send encrypted configuration information and encrypted state information to the mobile device. In some embodiments, an RFID device, may identify that a mobile device is within a predetermined area. The RFID device may send a tag to the mobile device. The RFID may send a notification to a communicator that the tag has been sent. The RFID may acquire the encrypted configuration information and encrypted state information form the communicator. The RFID device may push the encrypted configuration information and the encrypted state information to the mobile device.
-
Citations
1 Claim
-
1. A computer-implemented method comprising:
-
receiving, by a processor, an indication from a radio frequency identification (RFID) device that a mobile device is in a predetermined area, wherein the mobile device contains a public decryption key, and wherein the public decryption key is obtained from a regulatory entity; sending, by the processor, a private key on a first frequency at a first time to the mobile device, the private key verifying an identity of a controller, wherein the controller is maintained by the regulatory entity, and wherein the first frequency is within a first frequency range of 3 kHz to 300 GHz; receiving, by the processor and in response to sending the private key on the first frequency, a communication request from the mobile device to communicate with the controller on the first frequency; establishing, via the processor, a communication connection between the mobile device and the controller on the first frequency; sending, from the controller, encrypted configuration information and encrypted state information to the mobile device, wherein the encrypted configuration information includes a physical location of the RFID device and the encrypted state information includes an indication of a length of time of a sensor in relation to the physical location of the RFID device; receiving, by the processor, a second indication from the RFID device that a second mobile device is in the predetermined area, wherein the second mobile device contains the public decryption key; sending, by the processor, the private key on a second frequency at the first time to the second mobile device, wherein the second frequency is within a second frequency range of 2402 MHz to 2480 MHz; receiving, by the processor and in response to sending the private key on the second frequency, a second communication request from the second mobile device to communicate with the controller on the second frequency; establishing, via the processor, a second communication connection between the second mobile device and the controller on the second frequency; sending, from the controller, the encrypted configuration information and the encrypted state information to the second mobile device; sending, by the processor, the private key on the first frequency and the second frequency at a second time; identifying, by a third mobile device, that the private key is being sent on the first frequency, wherein the third mobile device contains the public decryption key; receiving, by the processor and in response to sending the private key on the first frequency and the second frequency at the second time, a third communication request from the third mobile device to communicate with the controller on the first frequency; establishing, via the processor, a third communication connection between the third mobile device and the controller on the first frequency; and sending, from the controller, the encrypted configuration information and the encrypted state information to the third mobile device.
-
Specification