PRIVATE VEHICLE-TO-VEHICLE COMMUNICATION
First Claim
1. A vehicle communication system comprising:
- sensors to monitor a target vehicle; and
a controller to;
generate a pseudoanonymous identifier based on an identifier and an attribute of the target vehicle;
broadcast a first message including the pseudo-anonymous identifier, a random number, and a public key; and
in response to receiving a second message including the identifier and the random number, broadcast a third message encrypted with a symmetric key included in the second message.
1 Assignment
0 Petitions
Accused Products
Abstract
Systems and methods are disclosed for private vehicle-to-vehicle communication. An example disclosed vehicle communication system includes sensors to monitor a target vehicle, and a controller. The example controller generates a pseudo-anonymous identifier based on an identifier and an attribute of the target vehicle. Additionally, the controller broadcasts a first message including the pseudo-anonymous identifier, a random number, and a public key. In response to receiving a second message including the identifier and the random number, the example controller broadcasts a third message encrypted with a symmetric key included in the second message.
23 Citations
15 Claims
-
1. A vehicle communication system comprising:
-
sensors to monitor a target vehicle; and a controller to; generate a pseudoanonymous identifier based on an identifier and an attribute of the target vehicle; broadcast a first message including the pseudo-anonymous identifier, a random number, and a public key; and in response to receiving a second message including the identifier and the random number, broadcast a third message encrypted with a symmetric key included in the second message. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A method to establish private communication with a target vehicle comprising:
-
generating, with a processor, a pseudo-anonymous identifier based on an identifier and an attribute of the target vehicle; broadcasting a first message including the pseudo-anonymous identifier, a random number, and a public key; and in response to receiving a second message including the identifier and the random number, broadcasting a third message encrypted with a symmetric key included in the second message. - View Dependent Claims (9, 10, 11, 12, 13, 14)
-
-
15. A method to privately communicate between a first and second vehicle comprising:
-
generating, by the first vehicle, a first pseudoanonymous identifier based on a discernible identifier and a measurable attribute of the second vehicle; broadcasting, by the first vehicle, an initial message that includes the first pseudoanonymous identifier, a random number, and a public key; comparing, by the second vehicle, the first pseudoanonymous identifier to a second pseudoanonymous identifier generated by the second vehicle based the discernible identifier and measurable attribute of the second vehicle; in response to a match, generating, by the second vehicle, an response message encrypted with the public key, the response message including the random number, the discernible identifier of the second vehicle, and a symmetric key; communicating, by the first vehicle, with second vehicle using the symmetric key when the random number and the discernible identifier of the second vehicle in the response message match the discernible identifier used to generate the first pseudoanonymous identifier and the random number in the initial message.
-
Specification