Activation of cryptographically paired device
First Claim
Patent Images
1. A method comprising:
- detecting, at a first subsystem of a vehicle, a presence of a mobile computing device proximate to the first subsystem;
determining, by the first subsystem of the vehicle, whether the mobile computing device has previously established a cryptographic pairing with the first subsystem of the vehicle; and
in response to determining that the mobile computing device has previously established a cryptographic pairing with the first subsystem of the vehicle;
determining, by the first subsystem of the vehicle, an identity of a user associated with the mobile computing device;
in response to determining that the identity of the user corresponds to a first identity, setting, by the first subsystem of the vehicle, the functionality of the second subsystem of the vehicle to a first state;
in response to determining that the identity of the user corresponds to a second identity, setting, by the first subsystem of the vehicle, the functionality of the second subsystem of the vehicle to a second state; and
in response to determining that the mobile computing device has not previously established a cryptographic pairing with the first subsystem of the vehicle, setting, by the first subsystem of the vehicle, a functionality of a second subsystem of the vehicle to a third state.
0 Assignments
0 Petitions
Accused Products
Abstract
An event is detected at a first device. Responsive to the detection, at least some functionality of the first device is deactivated. The presence of a second device, cryptographically paired with the first device, is detected by the first device. Responsive to the detection, at least some functionality of the first device is activated or reactivated.
-
Citations
30 Claims
-
1. A method comprising:
-
detecting, at a first subsystem of a vehicle, a presence of a mobile computing device proximate to the first subsystem; determining, by the first subsystem of the vehicle, whether the mobile computing device has previously established a cryptographic pairing with the first subsystem of the vehicle; and in response to determining that the mobile computing device has previously established a cryptographic pairing with the first subsystem of the vehicle; determining, by the first subsystem of the vehicle, an identity of a user associated with the mobile computing device; in response to determining that the identity of the user corresponds to a first identity, setting, by the first subsystem of the vehicle, the functionality of the second subsystem of the vehicle to a first state; in response to determining that the identity of the user corresponds to a second identity, setting, by the first subsystem of the vehicle, the functionality of the second subsystem of the vehicle to a second state; and in response to determining that the mobile computing device has not previously established a cryptographic pairing with the first subsystem of the vehicle, setting, by the first subsystem of the vehicle, a functionality of a second subsystem of the vehicle to a third state. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10)
-
-
11. A first subsystem for a vehicle, the first subsystem comprising:
-
a processor; and a computer-readable medium coupled to the processor and storing instructions that, when executed by the processor, cause the processor to; detect a presence of a mobile computing device proximate to the first subsystem; determine whether the mobile computing device has previously established a cryptographic pairing with the first subsystem of the vehicle; and in response to determining that the mobile computing device has previously established a cryptographic pairing with the first subsystem of the vehicle; determine an identity of a user associated with the mobile computing device; in response to determining that the identity of the user corresponds to a first identity, set a functionality of the second subsystem of the vehicle to a first state; in response to determining that the identity of the user corresponds to a second identity, set the functionality of the second subsystem of the vehicle to a second state; and in response to determining that the mobile computing device has not previously established a cryptographic pairing with the first subsystem of the vehicle, setting, by the first subsystem of the vehicle, a functionality of a second subsystem of the vehicle to a third state. - View Dependent Claims (12, 13, 14, 15, 16, 17, 18, 19, 20)
-
-
21. A non-transitory computer-readable storage medium having stored therein program instructions that, when executed by a processor in a first subsystem of a vehicle, cause the processor to perform a method comprising:
-
detecting a presence of a mobile computing device proximate to the first subsystem; determining whether the mobile computing device has previously established a cryptographic pairing with the first subsystem of the vehicle; and in response to determining that the mobile computing device has previously established a cryptographic pairing with the first subsystem of the vehicle; determining an identity of a user associated with the mobile computing device; in response to determining that the identity of the user corresponds to a first identity, setting the functionality of a second subsystem of the vehicle to a first state; in response to determining that the identity of the user corresponds to a second identity, setting the functionality of the second subsystem of the vehicle to a second state; and in response to determining that the mobile computing device has not previously established a cryptographic pairing with the first subsystem of the vehicle, setting, by the first subsystem of the vehicle, a functionality of a second subsystem of the vehicle to a third state. - View Dependent Claims (22, 23, 24, 25, 26, 27, 28, 29, 30)
-
Specification