Method for Protecting Deployed Assets in a Cooperative System
First Claim
1. A method for protecting the wireless transmission of information between nodes, each node employing a communications protocol including a plurality of protocol layers, said method comprising:
- providing sensors on the nodes that are used to provide node information;
providing the node information to at least one of the layers in the protocol for that node; and
encrypting information sent between at least two layers in the protocol that includes node information that is to be sent to other nodes so that a node will need to decrypt the information sent to it from another node.
11 Assignments
0 Petitions
Accused Products
Abstract
A communications system that includes techniques for protecting the transmission of data and information between vehicles so as to prevent a second automakers from using information developed by a first automaker. The communications system employs a layered protocol network. Sensors on the vehicle provide various information, some of which is sent to each layer in a network protocol and some of which may be broadcast. One or more encrypting algorithms is provided at suitable locations in the protocol, such as between the various layers or at the output of the sensors, that prevents data from being used by the second automaker'"'"'s vehicle transmitted from the first automaker'"'"'s vehicle who does not include a decryption algorithm to decrypt the information.
15 Citations
33 Claims
-
1. A method for protecting the wireless transmission of information between nodes, each node employing a communications protocol including a plurality of protocol layers, said method comprising:
-
providing sensors on the nodes that are used to provide node information; providing the node information to at least one of the layers in the protocol for that node; and encrypting information sent between at least two layers in the protocol that includes node information that is to be sent to other nodes so that a node will need to decrypt the information sent to it from another node. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 12, 13, 14, 15, 16)
-
-
11. The method according to claim i wherein encrypting information sent between at least two layers in the protocol includes encrypting information related to messages.
-
17. A method for protecting information transmitted between nodes, said method comprising:
-
providing sensors on the nodes that are used to provide node information; providing the node information to a network protocol for that node; broadcasting the node information from one node to other nodes; and encrypting the node information broadcast from the one node so that the other nodes will need to decrypt the information sent to it from the one node using decrypting information from a manufacturer of the one node before it can use the information. - View Dependent Claims (18, 19, 20, 21, 22, 23, 24, 25, 26, 27, 28)
-
-
29. A method for protecting the transmission of information between nodes, each vehicle employing an open system interconnection layer 7 model protocol including a physical layer, a data link layer, a network layer, a session layer, a presentation layer and an application layer, said method comprising:
-
providing sensors on the nodes that are used to provide node information including node location, node heading, node speed and node yaw rate; providing the node information to at least one of the layers in the protocol for that node; and encrypting information sent between at least two layers in the protocol that includes node information that is to be sent to other nodes so that a node will need to decrypt the information sent to it from another node, wherein encrypting information sent between at least two layers in the protocol includes providing an encryption algorithm that has a key where the algorithm and key need to be known by the node receiving the information, and wherein encrypting information sent between at least two layers includes encrypting information sent between the physical layer and the data link layer. - View Dependent Claims (30)
-
-
31. A method for protecting the use of a wireless network composed largely of mobile nodes, each node employing a network protocol, said method comprising:
requiring that a requesting node prove that it is a valid member of the network before any other node will provide certain network functions to the requesting node. - View Dependent Claims (32, 33)
Specification