Method for Detecting a Speed Violation of a Vehicle
First Claim
1. A method for detecting a speed violation of a vehicle traveling from a first roadside system to a second roadside system, comprising:
- setting-up private and public parameters, including a common modulo basis, of an identity based encryption (IBE) scheme in a key generation center and the first and second roadside systems;
capturing first evidence data comprising a first identifier of the vehicle and a first timestamp at the first roadside system, using a first identity comprising the first identifier and the first timestamp to generate a first IBE public key, encrypting the first evidence data with a first random session key, encrypting the first random session key with the first IBE public key, and deleting the first evidence data and the first session key at the first roadside system;
capturing second evidence data comprising a second identifier of the vehicle and a second timestamp at the second roadside system, using a second identity comprising the second identifier and the second timestamp to generate a second IBE public key, encrypting the second evidence data with a second random session key, encrypting the second random session key with the second IBE public key, and deleting the second evidence data and the second session key at the second roadside system;
calculating a ratio of the first and second public keys, modulo the common modulo basis, and looking-up the ratio in a table of ratios pre-computed for a set of time differences between said first and second timestamps which set represents speed violations, and, when the look-up is successful;
retrieving at least one IBE private key for at least one of said IBE public keys from the key generation center, decrypting at least one of said encrypted session keys with said private key, and decrypting at least one of said encrypted evidence data with said decrypted session key.
1 Assignment
0 Petitions
Accused Products
Abstract
Detecting a speed violation of a vehicle traveling from a first roadside system to a second roadside system comprises: protecting evidence data collected at two roadside systems by encrypting each set of data with random session keys at each roadside system, and then encrypting the random session keys with a public key generated from an identity that may include a vehicle identifier and a timestamp. A ratio of the public keys is calculated and used to detect a violation, whereupon a private key is obtained for decrypting at least one of the encrypted session keys, and decrypting at least one of the encrypted evidence data with the decrypted session key.
-
Citations
16 Claims
-
1. A method for detecting a speed violation of a vehicle traveling from a first roadside system to a second roadside system, comprising:
-
setting-up private and public parameters, including a common modulo basis, of an identity based encryption (IBE) scheme in a key generation center and the first and second roadside systems; capturing first evidence data comprising a first identifier of the vehicle and a first timestamp at the first roadside system, using a first identity comprising the first identifier and the first timestamp to generate a first IBE public key, encrypting the first evidence data with a first random session key, encrypting the first random session key with the first IBE public key, and deleting the first evidence data and the first session key at the first roadside system; capturing second evidence data comprising a second identifier of the vehicle and a second timestamp at the second roadside system, using a second identity comprising the second identifier and the second timestamp to generate a second IBE public key, encrypting the second evidence data with a second random session key, encrypting the second random session key with the second IBE public key, and deleting the second evidence data and the second session key at the second roadside system; calculating a ratio of the first and second public keys, modulo the common modulo basis, and looking-up the ratio in a table of ratios pre-computed for a set of time differences between said first and second timestamps which set represents speed violations, and, when the look-up is successful; retrieving at least one IBE private key for at least one of said IBE public keys from the key generation center, decrypting at least one of said encrypted session keys with said private key, and decrypting at least one of said encrypted evidence data with said decrypted session key. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16)
-
Specification