Connection key distribution
First Claim
Patent Images
1. A method of secure communication between a vehicle and a mobile device, comprising the steps of:
- generating a cryptographic key pair comprising at least a first cryptographic key and a second cryptographic key;
providing the first cryptographic key to a vehicle telematics unit (VTU);
providing within the vehicle a scannable image associated with the second cryptographic key, wherein the scannable image is readable by the mobile device using a software application installed on the mobile device;
receiving a message from the mobile device that is signed using the second cryptographic key after the mobile device has scanned the scannable image and extracted the second key; and
deciphering the message using the first cryptographic key.
3 Assignments
0 Petitions
Accused Products
Abstract
A system and a method implementing the method pertaining to securely providing a mobile device with a cryptographic key in a vehicle. The method includes generating a cryptographic key pair. The key pair may include at least a first cryptographic key and a second cryptographic key. The method may further include creating a label using a scannable image readable by a mobile device; the scannable image may be based on the second cryptographic key. And the method may include providing the label to the vehicle for displaying the scannable image.
32 Citations
13 Claims
-
1. A method of secure communication between a vehicle and a mobile device, comprising the steps of:
-
generating a cryptographic key pair comprising at least a first cryptographic key and a second cryptographic key; providing the first cryptographic key to a vehicle telematics unit (VTU); providing within the vehicle a scannable image associated with the second cryptographic key, wherein the scannable image is readable by the mobile device using a software application installed on the mobile device; receiving a message from the mobile device that is signed using the second cryptographic key after the mobile device has scanned the scannable image and extracted the second key; and deciphering the message using the first cryptographic key. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13)
-
Specification