METHOD FOR SECURING COMMUNICATION
20230232238 · 2023-07-20
Inventors
Cpc classification
H04L63/107
ELECTRICITY
H04W4/44
ELECTRICITY
International classification
Abstract
A method for securing communication between at least two participants, each having an identification and a safeguard and communicate therewith, in encrypted form involves the participants exchanging exchange their identification. At least one of the participants communicates its position in addition to its identification to the other participant. The position of the participant being determined or queried by the other participant without any assistance on the part of the participant, the participant then validating the other participant based on a comparison of the communicated position and the determined or queried position.
Claims
1-12. (canceled)
13. A method for securing communication between at least a first and second participant, the first participant has a first identification and the second participant has a second identification, the method comprising: sharing, by the first participant with the second participant, the first identification; sharing, by the second participant with the first participant, the second identification; transmitting, by the first participant to the second participant, a position of the first participant; calculating, by the second participant based on a signal delay time between the first and second participants via at least four navigation satellites and using a time stamp, a position of the first participant; and validating the first participant by the second participant based on a comparison of the transmitted position of the first participant and the calculated position of the first participant.
14. The method of claim 13, further comprising: transmitting, by the second participant to the first participant, a position of the second participant; calculating, by the first participant based on a signal delay time between the first and second participants via the at least four navigation satellites and using another time stamp, a position of the second participant; and validating the second participant by the first participant based on a comparison of the transmitted position of the second participant and the calculated position of the second participant.
15. The method of claim 13, wherein the time stamp is automatically transmitted by the first participant with the position of the first participant.
16. The method of claim 14, wherein the another time stamp is automatically transmitted by the second participant with the position of the second participant.
17. The method of claim 13, wherein the position of the first participant is transmitted to the second participant via at least one relay station, either directly or via a satellite control center.
18. The method of claim 14, wherein the position of the second participant is transmitted to the first participant via at least one relay station, either directly or via a satellite control center.
19. The method of claim 13, further comprising: validating, by the second participant, the transmitted or calculated position of the first participant using map data.
20. The method of 19, wherein places, distances or time periods between saved places and current places are used to validate map data.
21. The method of claim 14, further comprising: validating, by the first participant, the transmitted or calculated position of the second participant using map data.
22. The method of 21, wherein places, distances or time periods between saved places and current places are used to validate map data.
23. The method of claim 13, securely communicating between the first and second participants based on the validation of the first participant.
24. The method of claim 23, wherein the secure communication between the first and second participants involves transmission of software updates.
25. The method of claim 14, securely communicating between the first and second participants based on the validation of the first and second participants.
26. The method of claim 25, wherein the secure communication between the first and second participants involves transmission of software updates.
27. A non-transitory computer program product containing instructions for securing communication between at least a first and second participant, the first participant has a first identification and the second participant has a second identification, wherein execution of the instructions by the second participant causes the second participant to: receive, from the first participant, the first identification; receive, from the first participant, a position of the first participant; calculate, based on a signal delay time between the first and second participants via at least four navigation satellites and using a time stamp, a position of the first participant; and validate the first participant by the second participant based on a comparison of the transmitted position of the first participant and the calculated position of the first participant.
Description
BRIEF DESCRIPTION OF THE DRAWING FIGURES
[0019] Here:
[0020]
[0021]
[0022]
DETAILED DESCRIPTION
[0023]
[0024] In a first step 100, a request is sent out starting from the service center 2, to the vehicle 1 with identification V1, for example with the notification that a software update is due. As a participant, the vehicle 1 with the identification V1 establishes a communication with the service center, using its account with the identification V1 and the corresponding PIN, and asks who sent the message from the first step 100. In the depiction of
[0025] In an eighth step 800, the check carried out by the vehicle 1 in the fifth step 500 is then also carried out on the part of the service center 2. The service center 2 thus determines the same data in the same manner in this eighth step, here labelled with 800, and then arrives at a calculated position PP3, without the vehicle V1 being able to actively influence the determination of this value. This position is then reliable, regardless of whether the vehicle 1 has been hacked or not, just as it was for the position PP4 of the service center 2. If in step 900, the determined position PP3 and the shared position P3 are again the same, then the validation also occurs on the part of the service center 2, which is shared with the vehicle in a tenth step 1000. Otherwise, the method is aborted in step 910.
[0026] Following a positive validation of both participants 1, 2, secured communication can occur, for example as bi-directional communication in the step represented here with 1100. The security of this communication is correspondingly high, since, as has already been described at the beginning of the description, the intrusion of hackers into this communication is virtually impossible or is only possible with extreme effort due to the checking of the physical characteristic in the form of the position of the participants 1, 2. In the context of this communication, the software update from the service center 2 can then, for example, be uploaded to the vehicle 1 in the tenth step 1000. Here, it is possible to secure this communication with a unique key, which is only applicable to the current communication, so that after the end of the communication this key is also essentially useless, should it fall into the wrong hands.
[0027] In the depiction of
[0028] In the depiction of
[0029] It is here the case that in the scenario as can be identified in the depiction in
[0030] In both scenarios, it is now possible for the vehicle 1 to correspondingly compare the two positions, so to correspondingly carry out the step referred to with 500 in the depiction of
[0031] Although the invention has been illustrated and described in detail by way of preferred embodiments, the invention is not limited by the examples disclosed, and other variations can be derived from these by the person skilled in the art without leaving the scope of the invention. It is therefore clear that there is a plurality of possible variations. It is also clear that embodiments stated by way of example are only really examples that are not to be seen as limiting the scope, application possibilities or configuration of the invention in any way. In fact, the preceding description and the description of the figures enable the person skilled in the art to implement the exemplary embodiments in concrete manner, wherein, with the knowledge of the disclosed inventive concept, the person skilled in the art is able to undertake various changes, for example, with regard to the functioning or arrangement of individual elements stated in an exemplary embodiment without leaving the scope of the invention, which is defined by the claims and their legal equivalents, such as further explanations in the description.