Vehicle security
First Claim
Patent Images
1. A system comprising:
- a server configured toresponsive to receiving a remote command for a vehicle from an authorized mobile device, transmit the command to the vehicle, the vehicle being configured to responsively execute the command; and
responsive to identifying a security risk for the vehicle based on monitored third-party Internet data after the command is executed, deauthorize the mobile device from remotely commanding the vehicle and transmit a clean-up signal to the vehicle, the vehicle being configured to responsively remove user data from the vehicle.
1 Assignment
0 Petitions
Accused Products
Abstract
Systems and methods for managing vehicle security include a server that, responsive to receiving a remote command for a vehicle from an authorized mobile device, transmits the command to the vehicle. The vehicle responsively executes the command. The server also monitors third-party Internet data for security risks. Responsive to identifying a security risk for the vehicle based on the monitored third-party Internet data after the command is executed, the server deauthorizes the mobile device from remotely commanding the vehicle.
-
Citations
18 Claims
-
1. A system comprising:
a server configured to responsive to receiving a remote command for a vehicle from an authorized mobile device, transmit the command to the vehicle, the vehicle being configured to responsively execute the command; and responsive to identifying a security risk for the vehicle based on monitored third-party Internet data after the command is executed, deauthorize the mobile device from remotely commanding the vehicle and transmit a clean-up signal to the vehicle, the vehicle being configured to responsively remove user data from the vehicle. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
9. A system comprising:
a vehicle configured to responsive to a vehicle power-on event, automatically form a local wireless connection with a mobile device based on authorization data stored in the vehicle; and responsive to receiving a clean-up signal from a server transmitted responsive to the server identifying a security risk associated with the vehicle based on monitored third-party Internet data, deauthorize automatic connection with the mobile device by clearing the authorization data. - View Dependent Claims (10, 11, 12)
-
13. A method comprising:
-
by a server subscribing to a third-party Internet source of security risk indicators for a plurality of vehicle identification numbers (VINs); responsive to receiving a remote command for a vehicle including one of the VINs from an authorized mobile device, causing the vehicle to execute the command; responsive to receiving a security risk indicator notification for the VIN via the subscription, deauthorizing the mobile device from remotely commanding the vehicle and transmitting a clean-up signal to the vehicle; and by a vehicle responsive to receiving the clean-up signal, removing user data from the vehicle. - View Dependent Claims (14, 15, 16, 17, 18)
-
Specification