Patents by Inventor Matthew Steven Vrba
Matthew Steven Vrba has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20240109564Abstract: A method is provided that can include activating at least two wireless communication channels in parallel, between a first wireless transceiver and a second wireless transceiver. Each of the at least two wireless communication channels can operate at a different radio carrier frequency, and the first wireless transceiver may be part of a first vehicle. The method can also include transmitting, by the first wireless transceiver, common information in parallel on the at least two wireless communication channels to the second wireless transceiver and deactivating the at least two wireless communication channels.Type: ApplicationFiled: December 12, 2023Publication date: April 4, 2024Inventors: Padam Dhoj Swar, Carl L. Haas, Danial Rice, Rebecca W. Dreasher, Adam Hausmann, Matthew Steven Vrba, Edward J. Kuchar, James Lucas, Andrew Ryan Staats, Jerrid D. Chapman, Jeffrey D. Kernwein, Janmejay Tripathy, Stephen Craven, Tania Lindsley, Derek K. Woo, Ann K. Grimm, Scott Sollars, Phillip A. Burgart, James Allen Oswald, Shannon K. Struttmann, Stuart J. Barr, Keith Smith, Francois P. Pretorius, Craig K. Green, Kendrick Gawne, Irwin Morris, Joseph W. Gorman, Srivallidevi Muthusami, Mahesh Babu Natarajan, Jeremiah Dirnberger, Adam Franco
-
Patent number: 11871234Abstract: A computer-implemented method is provided that includes obtaining a first secret and a first public key, and obtaining a second secret a second public key. The method may also include authenticating the first public key of the first vehicle based on a first private key associated with the first vehicle, and authenticating the second public key of the second vehicle based on a second private key associated with the second vehicle. The method may also include preventing a man-in-the-middle attack, by securing at least one of a first vehicle-to-central office communication, a central office-to-first vehicle communication, or a first vehicle-to-second vehicle, wherein the first vehicle-to-central office communication and the central office-to-first vehicle communication are authenticated based on a determined private key associated with a respective first vehicle on-board computer, and sending a message, with the central office server, to a vehicle associated with a conditional movement authority.Type: GrantFiled: October 18, 2021Date of Patent: January 9, 2024Assignee: TRANSPORTATION IP HOLDINGS, LLCInventors: Rebecca W. Dreasher, Adam Hausmann, Matthew Steven Vrba, Edward J. Kuchar, James Lucas, Andrew Ryan Staats, Jerrid D. Chapman, Jeffrey D. Kernwein, Janmejay Tripathy, Stephen Craven, Tania Lindsley, Derek K. Woo, Ann K. Grimm, Scott Sollars, Phillip A. Burgart, James Allen Oswald, Shannon K. Struttmann, Stuart J. Barr, Keith Smith, Francois P. Pretorius, Craig K. Green, Kendrick Gawne, Irwin Morris, Joseph W. Gorman
-
Patent number: 11254337Abstract: A system for determining a location of a rail vehicle based on a radio frequency (RF) signal includes at least one processor programmed or configured to receive an RF signal transmitted by at least one radio transmitter device, where the RF signal includes location data associated with the location of the at least one radio transmitter device, determine a location of the at least one radio transmitter device based on the location data associated with the location of the at least one radio transmitter included in the RF signal, and determine a location of a rail vehicle based on the location of the at least one radio transmitter device. A method and computer program product are also disclosed.Type: GrantFiled: December 13, 2018Date of Patent: February 22, 2022Assignee: Westinghouse Air Brake Technologies CorporationInventors: Stephen Craven, Ann K. Grimm, Matthew Steven Vrba
-
Publication number: 20220038906Abstract: A computer-implemented method is provided that includes obtaining a first secret and a first public key, and obtaining a second secret a second public key. The method may also include authenticating the first public key of the first vehicle based on a first private key associated with the first vehicle, and authenticating the second public key of the second vehicle based on a second private key associated with the second vehicle. The method may also include preventing a man-in-the-middle attack, by securing at least one of a first vehicle-to-central office communication, a central office-to-first vehicle communication, or a first vehicle-to-second vehicle, wherein the first vehicle-to-central office communication and the central office-to-first vehicle communication are authenticated based on a determined private key associated with a respective first vehicle on-board computer, and sending a message, with the central office server, to a vehicle associated with a conditional movement authority.Type: ApplicationFiled: October 18, 2021Publication date: February 3, 2022Inventors: Rebecca W. Dreasher, Adam Hausmann, Matthew Steven Vrba, Edward J. Kuchar, James Lucas, Andrew Ryan Staats, Jerrid D. Chapman, Jeffrey D. Kernwein, Janmejay Tripathy, Stephen Craven, Tania Lindsley, Derek K. Woo, Ann K. Grimm, Scott Sollars, Phillip A. Burgart, James Allen Oswald, Shannon K. Struttmann, Stuart J. Barr, Keith Smith, Francois P. Pretorius, Craig K. Green, Kendrick Gawne, Irwin Morris, Joseph W. Gorman
-
Patent number: 11153077Abstract: A system and method for a secure key exchange between two trains operating within a track network may include generating a first or second public key based on a secret random number, generating a shared secret key based on the first or second public key, authenticating one or more key exchange communications by a remote server based on a digital signature established with an on-board key associated with the first train, authenticating a communication by a remote server based on the digital signature of the second train signed with an on-board key associated with the second train, and establishing secure train-to-train communication between the two trains by generating a shared secret key based on a public key received from the other train, the secure key exchange protecting the two trains from a man-in-the-middle attack.Type: GrantFiled: December 14, 2018Date of Patent: October 19, 2021Assignee: WESTINGHOUSE AIR BRAKE TECHNOLOGIES CORPORATIONInventors: Rebecca W. Dreasher, Stephen Craven, Matthew Steven Vrba
-
Publication number: 20200189629Abstract: A system for determining a location of a rail vehicle based on a radio frequency (RF) signal includes at least one processor programmed or configured to receive an RF signal transmitted by at least one radio transmitter device, where the RF signal includes location data associated with the location of the at least one radio transmitter device, determine a location of the at least one radio transmitter device based on the location data associated with the location of the at least one radio transmitter included in the RF signal, and determine a location of a rail vehicle based on the location of the at least one radio transmitter device. A method and computer program product are also disclosed.Type: ApplicationFiled: December 13, 2018Publication date: June 18, 2020Inventors: Stephen Craven, Ann K. Grimm, Matthew Steven Vrba
-
Publication number: 20200195426Abstract: A system and method for a secure key exchange between two trains operating within a track network may include generating a first or second public key based on a secret random number, generating a shared secret key based on the first or second public key, authenticating one or more key exchange communications by a remote server based on a digital signature established with an on-board key associated with the first train, authenticating a communication by a remote server based on the digital signature of the second train signed with an on-board key associated with the second train, and establishing secure train-to-train communication between the two trains by generating a shared secret key based on a public key received from the other train, the secure key exchange protecting the two trains from a man-in-the-middle attack.Type: ApplicationFiled: December 14, 2018Publication date: June 18, 2020Inventors: Rebecca W. Dreasher, Stephen Craven, Matthew Steven Vrba