METHOD OF SECURING AND AUTHENTICATING DATA USING MICRO-CERTIFICATES
First Claim
1. A method of securing wireless communications, the method comprising:
- (a) storing a recipient'"'"'s micro-certificate at a vehicle, a call center, or a certificate authority;
(b) transmitting the micro-certificate from its place of storage, wherein the micro-certificate includes a public key having a length that is more than half the length of the micro-certificate;
(c) extracting the public key from the micro-certificate;
(d) encrypting a vehicle communication using the public key;
(e) transmitting the encrypted vehicle communication to the recipient; and
(f) decrypting the vehicle communication using a private key after receiving the vehicle communication.
10 Assignments
0 Petitions
Accused Products
Abstract
A method of securing wireless communications includes storing a recipient'"'"'s micro-certificate at a vehicle, a call center, or a certificate authority, transmitting the micro-certificate from its place of storage, extracting the public key from the micro-certificate, encrypting the vehicle communication using the public key, transmitting the encrypted vehicle communication to the recipient, and decrypting the vehicle communication using a private key after receiving the vehicle communication. The micro-certificate can include identifying data for the recipient and can have a length that is less than twice the length of the public key contained in the micro-certificate.
35 Citations
20 Claims
-
1. A method of securing wireless communications, the method comprising:
-
(a) storing a recipient'"'"'s micro-certificate at a vehicle, a call center, or a certificate authority; (b) transmitting the micro-certificate from its place of storage, wherein the micro-certificate includes a public key having a length that is more than half the length of the micro-certificate; (c) extracting the public key from the micro-certificate; (d) encrypting a vehicle communication using the public key; (e) transmitting the encrypted vehicle communication to the recipient; and (f) decrypting the vehicle communication using a private key after receiving the vehicle communication. - View Dependent Claims (2, 3, 4, 5, 6)
-
-
7. A method of securing wireless communications, the method comprising:
-
(a) storing a private key at a vehicle; (b) requesting a micro-certificate at a vehicle telematics unit, wherein the micro-certificate includes a public key belonging to a recipient and an identifying data string; (c) receiving the micro-certificate at the vehicle; (d) extracting the public key belonging to the recipient from the micro-certificate; (e) generating a first encryption of a vehicle communication, wherein the communication is encrypted using the extracted public key belonging to the recipient; (f) performing a second encryption on the generated first encrypted vehicle communication using the private key stored at the vehicle; and (g) transmitting the results of the second encryption between a vehicle and the recipient. - View Dependent Claims (8, 9, 10, 11, 12, 13)
-
-
14. A method of securing wireless communications, the method comprising:
-
(a) storing a private key at a call center; (b) requesting a micro-certificate at a call center, wherein the micro-certificate includes a public key belonging to a vehicle; (c) receiving the micro-certificate at the call center; (d) extracting the public key belonging to the vehicle from the micro-certificate; (e) performing a first encryption of a vehicle communication at the call center using the public key belonging to the vehicle; (f) using the results of the first encryption to perform a second encryption at the call center using the private key stored at the call center; and (g) after the second encryption, sending the vehicle communication to the vehicle. - View Dependent Claims (15, 16, 17, 18, 19, 20)
-
Specification