Micron Technology, Inc.
Verifying Identity of an Emergency Vehicle During Operation
Last updated:
Abstract:
A method includes: receiving, by a computing device of a first vehicle, a command from a host device; in response to receiving the command, storing a new device secret in memory; generating, by the computing device using the new device secret, a triple comprising an identifier, a certificate, and a public key; and sending, by the computing device, the triple to a second vehicle, where the second vehicle is configured to verify an identity of the first vehicle using the triple.
Status:
Application
Type:
Utility
Filling date:
11 May 2022
Issue date:
1 Sep 2022