US 12,389,231 B2
Method for securing communication between a communication system of a vehicle and a vehicle-external server
Viktor Friesen, Karlsruhe (DE); and Viktor Pavlovic, Stuttgart (DE)
Assigned to MERCEDES-BENZ GROUP AG, Stuttgart (DE)
Appl. No. 18/275,253
Filed by MERCEDES-BENZ GROUP AG, Stuttgart (DE)
PCT Filed Jan. 17, 2022, PCT No. PCT/EP2022/050824
§ 371(c)(1), (2) Date Aug. 1, 2023,
PCT Pub. No. WO2022/167201, PCT Pub. Date Aug. 11, 2022.
Claims priority of application No. 10 2021 000 522.8 (DE), filed on Feb. 2, 2021.
Prior Publication US 2024/0121615 A1, Apr. 11, 2024
Int. Cl. H04W 12/60 (2021.01); G07C 5/00 (2006.01); G06F 8/65 (2018.01)
CPC H04W 12/60 (2021.01) [G07C 5/008 (2013.01); G06F 8/65 (2013.01)] 9 Claims
OG exemplary drawing
 
1. A method for securing communication between a communication system of a vehicle and a vehicle-external server via a communication interface, the communication interface being secured such that data is transmittable to the communication system in a manner that protects its integrity and authenticity, the method comprising:
implementing a first securing method for non-post-quantum-resistant securing of exchanged data in the communication system via the communication interface;
implementing a second securing method for post-quantum-resistant securing of exchanged data in the communication system via the communication interface, implementing the second securing method for post-quantum-resistant securing of exchanged data in the communication system via another interface implemented in the communication system, or implementing the second securing method for post-quantum-resistant securing of exchanged data in the communication system via a software update; and
introducing key material for use in the second securing method via a further interface, wherein the further interface is implemented in the communication system or is implemented via a software update, wherein the introduced key material is received in a cryptographically encrypted manner and is securely stored for exclusive use in the second securing method, wherein the key material is introduced via the further interface with symmetrical cryptographic encryption.