Method and apparatus for remote authentication
First Claim
1. A computer-implemented authentication method comprising:
- compiling, at a vehicle, a list of applications having current vehicle-stored approval for use on a vehicle computing system (VCS);
transmitting the list from the vehicle to a remote server;
receiving a response from the remote server indicating authorization status of applications on the list;
determining an application on the list not authorized for use with the VCS based on the response; and
preventing resource access by the determined application.
1 Assignment
0 Petitions
Accused Products
Abstract
A computer-implemented authentication method includes receiving a request to access one or more features of a vehicle computing system (VCS) from an application running on a wireless device in communication with the VCS. The method further includes preparing a secure access rights request to a remote server including one or more characteristics associated with the application and sending the secure request from the VCS, through the wireless device to the remote server. The method additionally includes receiving a response to the request having been sent from the remote server through the wireless device. The method includes verifying the authenticity of the received response and updating a policy table including information from the received response, the information including at least an expiration trigger and access rights for the application. Also, the method includes validating the application for usage based at least on the information included in the updated policy table.
-
Citations
6 Claims
-
1. A computer-implemented authentication method comprising:
-
compiling, at a vehicle, a list of applications having current vehicle-stored approval for use on a vehicle computing system (VCS); transmitting the list from the vehicle to a remote server; receiving a response from the remote server indicating authorization status of applications on the list; determining an application on the list not authorized for use with the VCS based on the response; and preventing resource access by the determined application. - View Dependent Claims (2, 3, 4, 5, 6)
-
Specification