Publication number: 20220038906
Abstract: A computer-implemented method is provided that includes obtaining a first secret and a first public key, and obtaining a second secret a second public key. The method may also include authenticating the first public key of the first vehicle based on a first private key associated with the first vehicle, and authenticating the second public key of the second vehicle based on a second private key associated with the second vehicle. The method may also include preventing a man-in-the-middle attack, by securing at least one of a first vehicle-to-central office communication, a central office-to-first vehicle communication, or a first vehicle-to-second vehicle, wherein the first vehicle-to-central office communication and the central office-to-first vehicle communication are authenticated based on a determined private key associated with a respective first vehicle on-board computer, and sending a message, with the central office server, to a vehicle associated with a conditional movement authority.
Type:
Application
Filed:
October 18, 2021
Publication date:
February 3, 2022
Inventors:
Rebecca W. Dreasher, Adam Hausmann, Matthew Steven Vrba, Edward J. Kuchar, James Lucas, Andrew Ryan Staats, Jerrid D. Chapman, Jeffrey D. Kernwein, Janmejay Tripathy, Stephen Craven, Tania Lindsley, Derek K. Woo, Ann K. Grimm, Scott Sollars, Phillip A. Burgart, James Allen Oswald, Shannon K. Struttmann, Stuart J. Barr, Keith Smith, Francois P. Pretorius, Craig K. Green, Kendrick Gawne, Irwin Morris, Joseph W. Gorman