Anti-spoofing protection in an automotive environment
First Claim
1. A method for automatically identifying attempts at presenting falsified vehicle identifiers to portable devices to establish unauthorized communication links, the method comprising:
- receiving, by one or more computing devices from a portable device, (i) a vehicle identifier reported by a vehicle with which the portable device is establishing a short-range communication link, and (ii) an indication of a current location of the portable device, at a first time;
obtaining, by the one or more computing devices, an indication of a recent location at which the vehicle identifier was reported at a second time;
comparing, by the one or more computing devices, the current location of the portable device to the recent location of the vehicle, in view of the first time and the second time; and
in response to determining that the current location is not proximate to the recent reported location of the vehicle, generating, by the one or more computing devices, an indication that the reported identifier is likely falsified.
2 Assignments
0 Petitions
Accused Products
Abstract
To automatically identify an attempt at presenting falsified vehicle identifiers to portable devices, (i) a vehicle identifier reported by a vehicle with which the portable device is establishing a short-range communication link, and (ii) an indication of a current location of the portable device, are received from a portable device at a first time. An indication of a recent location at which the vehicle identifier was reported at a second time is obtained. The current location of the portable device is compared to the recent location of the vehicle, in view of the first time and the second time. In response to determining that the current location is not proximate to the recent reported location of the vehicle, an indication that the reported identifier is likely falsified is generated.
-
Citations
20 Claims
-
1. A method for automatically identifying attempts at presenting falsified vehicle identifiers to portable devices to establish unauthorized communication links, the method comprising:
-
receiving, by one or more computing devices from a portable device, (i) a vehicle identifier reported by a vehicle with which the portable device is establishing a short-range communication link, and (ii) an indication of a current location of the portable device, at a first time; obtaining, by the one or more computing devices, an indication of a recent location at which the vehicle identifier was reported at a second time; comparing, by the one or more computing devices, the current location of the portable device to the recent location of the vehicle, in view of the first time and the second time; and in response to determining that the current location is not proximate to the recent reported location of the vehicle, generating, by the one or more computing devices, an indication that the reported identifier is likely falsified. - View Dependent Claims (2, 3, 4, 5, 6, 14)
-
-
7. A portable computing device comprising:
-
a short-range communication interface to communicate with a vehicle; a long-range communication interface to communicate with a verification server; one or more processors coupled to the short-range communication interface; and a computer-readable medium storing thereon instructions that, when executed on the one or more processors, cause the portable device to; receive a vehicle identifier from the vehicle, determine a current location of the portable device, transmit the vehicle identifier and an indication of the current location to the verification server, and receive an indication of whether the vehicle identifier is likely falsified from the verification server, the indication based on a determination of whether the current location reported by the portable computing device is proximate to a recently reported location of the vehicle. - View Dependent Claims (8, 9, 10, 11, 12, 13)
-
-
15. A non-transitory tangible computer-readable storage medium having executable computer code stored thereon for automatically identifying attempts at presenting falsified vehicle identifiers, the code comprising a set of instructions that causes one or more processors to perform the following:
-
receive, from a portable device, (i) a vehicle identifier reported by a vehicle with which the portable device is establishing a short-range communication link, and (ii) an indication of a current location of the portable device, at a first time; obtain an indication of a recent location at which the vehicle identifier was reported at a second time; compare the current location of the portable device to the recent location of the vehicle, in view of the first time and the second time; and in response to determining that the current location is not proximate to the recent reported location of the vehicle, generate an indication that the reported identifier is likely falsified. - View Dependent Claims (16, 17, 18, 19, 20)
-
Specification