Method for exchanging data between a vehicle and an infrastructure or a further vehicle

20200070776 ยท 2020-03-05

Assignee

Inventors

Cpc classification

International classification

Abstract

Method for the encrypted exchange of data between a vehicle and an infrastructure or a further vehicle using headlamp light of the vehicle, wherein the data are encrypted and modulated onto the headlamp light in order to identify the user and/or the vehicle, wherein the key for encrypting the data is generated by user-controlled transformation.

Claims

1. A method for the encrypted exchange of data between a first vehicle and an infrastructure or a second vehicle using a headlamp light of the first vehicle, the method comprising: encrypting the data, modulating the data onto the headlamp light, identifying, based on modulating the data, the first vehicle, and generating a key for encrypting the data by user-controlled transformation.

2. The method according to claim 1, wherein the user-controlled transformation comprises an image or video transformation.

3. The method according to claim 1, wherein the headlamp comprises a matrix LED or a matrix laser headlamp light.

4. The method according to claim 1, wherein the key is exchanged periodically and/or on request with the infrastructure or the second vehicle.

5. The method according to claim 2, further comprising conducting a visual check of the key.

6. The method according to claim 1, wherein the data additionally have an identification code for the first vehicle.

7. The mefhod according to claim 1, wherein the user-controlled transformation takes place on a touch display.

8. A vehicle, comprising: a headlight; a human machine interface (HMI); and a computing device configured to: determine, based an image signature on the HMI, a key, receive a communication from an infrastructure component or a second vehicle, and transmit, based on the communication from the infrastructure component or the second vehicle and via light emitted by the headlight, the key to the infrastructure component or the second vehicle.

9. The vehicle of claim 8, wherein image signature comprises a user-controlled transformation comprising an image or video transformation.

10. The vehicle of claim 8, wherein the headlight comprises a matrix LED or a matrix laser headlamp light.

11. The vehicle of claim 8, wherein the vehicle is configured to conduct a visual check of the key.

12. The vehicle of claim 8, wherein the key comprises an identification code for the vehicle.

Description

[0070] Further details of the invention can be found in the following description of example embodiments with reference to the drawing, in which:

[0071] FIG. 1 shows a flow diagram of the interaction between a vehicle and an infrastructure according to the invention.

[0072] FIG. 1 explains on the whole a method for the encrypted exchange of data between a vehicle and an infrastructure using headlamp light of the vehicle. The data are encrypted and modulated onto the headlamp light in order to identify the user and the vehicle, wherein the key for encrypting the data is generated by user-controlled transformation.

[0073] It specifically describes the interaction between a passenger vehicle and an infrastructure in the form of a highway barrier in order to open the barrier after a payment has been made.

[0074] In the example, all communications are performed by means of light signal transmission via vehicle headlamps and light sensors of the respective infrastructure or via light signals from the infrastructure and light sensors on the vehicle. Alternatively, a wireless radio transmission could also be used for the infrastructure-to-vehicle communication.

[0075] In the present example, a 2D image signature of the driver is requested in order to generate the encryption key of the passenger vehicle (encryption key of the vehicle (EKV)).

[0076] The 2D image signature is generated by the driver by doing some drawing on a touch display on which an image is displayed, thus generating an image signature as a first set of data or bits.

[0077] In the example, a handshake method is described in which the infrastructure and the vehicle first exchange their keys (their encryption keys). The method offers the advantage that the keys can be changed during each communication, e.g. by using a different 2D image signature.

[0078] This increases security against spying.

[0079] The method proceeds as follows.

[0080] The passenger vehicle drives on the highway and approaches a toll barrier. The toll barrier recognizes this (1) and then transmits, on the one hand, its own key and a request for the passenger vehicle key (2).

[0081] The passenger vehicle checks (3) the key of the toll barrier via a wireless Internet connection and, in the event of a positive check, the key of the toll barrier is stored in the passenger vehicle and is saved for the further communication decryption in the passenger vehicle (4).

[0082] The passenger vehicle then transmits its key via the headlamp modulation (5). The key has previously been generated by the driver by drawing a pattern on an image shown on a touch display of the passenger vehicle (5A).

[0083] The toll barrier receives and temporarily stores the key of the passenger vehicle (6) and then uses it to decrypt the communication with the passenger vehicle.

[0084] The toll barrier then transmits an encrypted request to the passenger vehicle to furnish evidence of the paid toll, whereupon the passenger vehicle can then decrypt said request (7).

[0085] The passenger vehicle contacts a bank via a wireless Internet connection (8) to make the payment, wherein the passenger vehicle transmits its key (from above) for the authorization (9).

[0086] The bank then effects the transfer (10) and transmits a transaction code as confirmation.

[0087] The passenger vehicle generates (11) a response to the payment request from its key and the transaction code (7) and transmits it encrypted in this way via the headlamps to the toll barrier (12).

[0088] The toll barrier extracts the transaction code and checks it with the bank via a wireless Internet connection (13).

[0089] If the transaction code is valid (14), the barrier opens (15).

[0090] If the transaction code is invalid (16), a transmission fault is checked (distance too great, etc.). If a fault is present, the vehicle is requested to retransmit the transaction code (return to 11).

[0091] If no fault is present, the passenger vehicle is notified that only a manual toll barrier processing is possible, so that the passenger vehicle must be relocated.