Activation of cryptographically paired device
First Claim
Patent Images
1. A method comprising:
- detecting, by a first subsystem of a vehicle, a presence of a plurality of mobile computing devices proximate to the first subsystem;
determining a configuration preference for at least one of the plurality of mobile computing devices;
selecting a mobile computing device from the plurality of mobile computing devices based on the determined configuration preference;
determining, by the first subsystem of the vehicle, whether the selected mobile computing device has previously established a cryptographic pairing with the first subsystem of the vehicle;
in response to determining that the selected mobile computing device has not previously established a cryptographic pairing with the first subsystem of the vehicle, setting, by the first subsystem of the vehicle, a functionality of a second subsystem of the vehicle to a first state; and
in response to determining that the selected mobile computing device has previously established a cryptographic pairing with the first subsystem of the vehicle, setting, by the first subsystem of the vehicle, the functionality of the second subsystem of the vehicle to a second state.
0 Assignments
0 Petitions
Accused Products
Abstract
An event is detected at a first device. Responsive to the detection, at least some functionality of the first device is deactivated. The presence of a second device, cryptographically paired with the first device, is detected by the first device. Responsive to the detection, at least some functionality of the first device is activated or reactivated.
76 Citations
43 Claims
-
1. A method comprising:
-
detecting, by a first subsystem of a vehicle, a presence of a plurality of mobile computing devices proximate to the first subsystem; determining a configuration preference for at least one of the plurality of mobile computing devices; selecting a mobile computing device from the plurality of mobile computing devices based on the determined configuration preference; determining, by the first subsystem of the vehicle, whether the selected mobile computing device has previously established a cryptographic pairing with the first subsystem of the vehicle; in response to determining that the selected mobile computing device has not previously established a cryptographic pairing with the first subsystem of the vehicle, setting, by the first subsystem of the vehicle, a functionality of a second subsystem of the vehicle to a first state; and in response to determining that the selected mobile computing device has previously established a cryptographic pairing with the first subsystem of the vehicle, setting, by the first subsystem of the vehicle, the functionality of the second subsystem of the vehicle to a second state. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 21, 22, 23, 24)
-
-
14. A first subsystem for a vehicle, the first subsystem comprising:
-
a processor; and a computer-readable medium coupled to the processor and storing instructions that, when executed by the processor, cause the processor to; detect a presence of a plurality of mobile computing devices proximate to the first subsystem; determine a configuration preference for at least one of the plurality of mobile computing devices; select a mobile computing device from the plurality of mobile computing devices based on the determined configuration preference; determine, by the first subsystem of the vehicle, whether the selected mobile computing device has previously established a cryptographic pairing with the first subsystem of the vehicle; in response to determining that the selected mobile computing device has not previously established a cryptographic pairing with the first subsystem of the vehicle, set a functionality of a second subsystem of the vehicle to a first state; and in response to determining that the selected mobile computing device has previously established a cryptographic pairing with the first subsystem of the vehicle, set the functionality of the second subsystem of the vehicle to a second state. - View Dependent Claims (15, 16, 17, 18, 19, 25, 26, 27, 28, 29, 30, 31)
-
-
20. A non-transitory computer-readable storage medium having stored therein program instructions that, when executed by a processor in a first subsystem of a vehicle, cause the processor to perform a method comprising:
-
detecting a presence of a plurality of mobile computing devices proximate to the first subsystem; determining a configuration preference for at least one of the plurality of mobile computing devices; selecting a mobile computing device from the plurality of mobile computing devices based on the determined configuration preference; determining, by the first subsystem of the vehicle, whether the selected mobile computing device has previously established a cryptographic pairing with the first subsystem of the vehicle; in response to determining that the selected mobile computing device has not previously established a cryptographic pairing with the first subsystem of the vehicle, setting a functionality of a second subsystem of the vehicle to a first state; and in response to determining that the selected mobile computing device has previously established a cryptographic pairing with the first subsystem of the vehicle, setting the functionality of the second subsystem of the vehicle to a second state. - View Dependent Claims (32, 33, 34, 35, 36, 37, 38, 39, 40, 41, 42, 43)
-
Specification