CONNECTION KEY DISTRIBUTION
First Claim
Patent Images
1. A method of securely providing a mobile device with a cryptographic key in a vehicle, comprising the steps of:
- generating a cryptographic key pair comprising at least a first cryptographic key and a second cryptographic key;
creating a label using a scannable image readable by a mobile device, wherein the scannable image is based on the second cryptographic key; and
providing the label to the vehicle for displaying the scannable image.
3 Assignments
0 Petitions
Accused Products
Abstract
A system and a method implementing the method pertaining to securely providing a mobile device with a cryptographic key in a vehicle. The method includes generating a cryptographic key pair. The key pair may include at least a first cryptographic key and a second cryptographic key. The method may further include creating a label using a scannable image readable by a mobile device; the scannable image may be based on the second cryptographic key. And the method may include providing the label to the vehicle for displaying the scannable image.
-
Citations
17 Claims
-
1. A method of securely providing a mobile device with a cryptographic key in a vehicle, comprising the steps of:
-
generating a cryptographic key pair comprising at least a first cryptographic key and a second cryptographic key; creating a label using a scannable image readable by a mobile device, wherein the scannable image is based on the second cryptographic key; and providing the label to the vehicle for displaying the scannable image. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
-
10. A method of secure communication between a vehicle and a mobile device, comprising the steps of:
-
generating a cryptographic key pair comprising at least a first cryptographic key and a second cryptographic key; providing the first cryptographic key to a vehicle telematics unit (VTU); providing within the vehicle a scannable image associated with the second cryptographic key, wherein the scannable image is readable by the mobile device using a software application installed on the mobile device; receiving a message from the mobile device that is signed using the second cryptographic key after the mobile device has scanned the scannable image and extracted the second key; and deciphering the message using the first cryptographic key. - View Dependent Claims (11, 12, 13, 14, 15, 16, 17)
-
Specification