Please download the dossier by clicking on the dossier button x
×

Method for Detecting a Speed Violation of a Vehicle

  • US 20130266139A1
  • Filed: 04/05/2013
  • Published: 10/10/2013
  • Est. Priority Date: 04/06/2012
  • Status: Active Grant
First Claim
Patent Images

1. A method for detecting a speed violation of a vehicle traveling from a first roadside system to a second roadside system, comprising:

  • setting-up private and public parameters, including a common modulo basis, of an identity based encryption (IBE) scheme in a key generation center and the first and second roadside systems;

    capturing first evidence data comprising a first identifier of the vehicle and a first timestamp at the first roadside system, using a first identity comprising the first identifier and the first timestamp to generate a first IBE public key, encrypting the first evidence data with a first random session key, encrypting the first random session key with the first IBE public key, and deleting the first evidence data and the first session key at the first roadside system;

    capturing second evidence data comprising a second identifier of the vehicle and a second timestamp at the second roadside system, using a second identity comprising the second identifier and the second timestamp to generate a second IBE public key, encrypting the second evidence data with a second random session key, encrypting the second random session key with the second IBE public key, and deleting the second evidence data and the second session key at the second roadside system;

    calculating a ratio of the first and second public keys, modulo the common modulo basis, and looking-up the ratio in a table of ratios pre-computed for a set of time differences between said first and second timestamps which set represents speed violations, and, when the look-up is successful;

    retrieving at least one IBE private key for at least one of said IBE public keys from the key generation center, decrypting at least one of said encrypted session keys with said private key, and decrypting at least one of said encrypted evidence data with said decrypted session key.

View all claims
  • 1 Assignment
Timeline View
Assignment View
    ×
    ×