The patent badge is an abbreviated version of the USPTO patent document. The patent badge does contain a link to the full patent document.
The patent badge is an abbreviated version of the USPTO patent document. The patent badge covers the following: Patent number, Date patent was issued, Date patent was filed, Title of the patent, Applicant, Inventor, Assignee, Attorney firm, Primary examiner, Assistant examiner, CPCs, and Abstract. The patent badge does contain a link to the full patent document (in Adobe Acrobat format, aka pdf). To download or print any patent click here.
Patent No.:
Date of Patent:
Jan. 09, 2024
Filed:
Oct. 18, 2021
Transportation Ip Holdings, Llc, Norwalk, CT (US);
Rebecca W. Dreasher, Longmont, CO (US);
Adam Hausmann, Melbourne, FL (US);
Matthew Steven Vrba, Marion, IA (US);
Edward J. Kuchar, Cedar Rapids, IA (US);
James Lucas, Ponte Vedra, FL (US);
Andrew Ryan Staats, Cedar Rapids, IA (US);
Jerrid D. Chapman, Belle Vernon, PA (US);
Jeffrey D. Kernwein, Cedar Rapids, IA (US);
Janmejay Tripathy, Cedar Rapids, IA (US);
Stephen Craven, Hiawatha, IA (US);
Tania Lindsley, Melbourne, FL (US);
Derek K. Woo, Rockledge, FL (US);
Ann K. Grimm, Cedar Rapids, IA (US);
Scott Sollars, Marion, IA (US);
Phillip A. Burgart, Cedar Rapids, IA (US);
James Allen Oswald, Coggon, IA (US);
Shannon K. Struttmann, Cedar Rapids, IA (US);
Stuart J. Barr, Cedar Rapids, IA (US);
Keith Smith, Cedar Rapids, IA (US);
Francois P. Pretorius, Paonia, CO (US);
Craig K. Green, Jefferson Hills, PA (US);
Kendrick Gawne, Cedar Rapids, IA (US);
Irwin Morris, Marion, IA (US);
Joseph W. Gorman, Cedar Rapids, IA (US);
TRANSPORTATION IP HOLDINGS, LLC, Norwalk, CT (US);
Abstract
A computer-implemented method is provided that includes obtaining a first secret and a first public key, and obtaining a second secret a second public key. The method may also include authenticating the first public key of the first vehicle based on a first private key associated with the first vehicle, and authenticating the second public key of the second vehicle based on a second private key associated with the second vehicle. The method may also include preventing a man-in-the-middle attack, by securing at least one of a first vehicle-to-central office communication, a central office-to-first vehicle communication, or a first vehicle-to-second vehicle, wherein the first vehicle-to-central office communication and the central office-to-first vehicle communication are authenticated based on a determined private key associated with a respective first vehicle on-board computer, and sending a message, with the central office server, to a vehicle associated with a conditional movement authority.