Private vehicle-to-vehicle communication
First Claim
Patent Images
1. A vehicle comprising:
- sensors; and
a controller configured to;
detect, via the sensors, a dynamic attribute and a static identifier of a target vehicle;
generate a pseudo-anonymous identifier by hashing the identifier and the attribute;
broadcast a first message including the pseudo-anonymous identifier, a random number, and a public key; and
responsive to receiving a second message including a symmetric key, the identifier and the random number, broadcast a third message using the symmetric key.
1 Assignment
0 Petitions
Accused Products
Abstract
Systems and methods are disclosed for private vehicle-to-vehicle communication. An example disclosed vehicle communication system includes sensors to monitor a target vehicle, and a controller. The example controller generates a pseudo-anonymous identifier based on an identifier and an attribute of the target vehicle. Additionally, the controller broadcasts a first message including the pseudo-anonymous identifier, a random number, and a public key. In response to receiving a second message including the identifier and the random number, the example controller broadcasts a third message encrypted with a symmetric key included in the second message.
7 Citations
20 Claims
-
1. A vehicle comprising:
-
sensors; and a controller configured to; detect, via the sensors, a dynamic attribute and a static identifier of a target vehicle; generate a pseudo-anonymous identifier by hashing the identifier and the attribute; broadcast a first message including the pseudo-anonymous identifier, a random number, and a public key; and responsive to receiving a second message including a symmetric key, the identifier and the random number, broadcast a third message using the symmetric key. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13)
-
-
14. A method to establish private communication with a target vehicle, the method comprising:
-
detecting, via sensors, an identifier and an attribute of the target vehicle; generating, with a processor, a pseudo-anonymous identifier by hashing the identifier and the attribute of the target vehicle; broadcasting a first message including the pseudo-anonymous identifier, a random number, and a public key; and in response to receiving a second message including the identifier and the random number, broadcasting a third message encrypted with a symmetric key included in the second message. - View Dependent Claims (15, 16, 17, 18, 19)
-
-
20. A method to privately communicate between a first and second vehicle comprising:
-
detecting, via sensors of the first vehicle, a discernible static identifier and a measurable dynamic attribute of the second vehicle; generating, by the first vehicle, a first pseudo-anonymous identifier by hashing the discernible identifier and the measurable attribute of the second vehicle; broadcasting, by the first vehicle, an initial message that includes the first pseudo-anonymous identifier, a random number, and a public key; comparing, by the second vehicle, the first pseudo-anonymous identifier to a second pseudo-anonymous identifier generated by the second vehicle based on the discernible identifier and measurable attribute of the second vehicle; in response to a match, generating, by the second vehicle, response message encrypted with the public key, the response message including the random number, the discernible identifier of the second vehicle, and a symmetric key; communicating, by the first vehicle, with second vehicle using the symmetric key when the random number and the discernible identifier of the second vehicle in the response message match the discernible identifier used to generate the first pseudo-anonymous identifier and the random number in the initial message.
-
Specification