Secure telematics
First Claim
1. A method for controlling use of proprietary resources associated with a vehicle, comprising:
- providing resources including proprietary resources associated with a vehicle including a plurality of the following;
a first bus, a first interface, a first display, a first vehicle device, a first subsystem, a first application, and a second application;
establishing a plurality of relationships involving at least three entities, wherein first and second entities of said at least three entities has proprietary rights in at least first and second proprietary resources, respectively, and each of said three entities accepts a plurality of conditions related to use of said at least first proprietary resource; and
performing at least a first function after said establishing while making use of at least said first and second proprietary resources.
2 Assignments
0 Petitions
Accused Products
Abstract
A telematics system that includes a security controller is provided. The security controller is responsible for ensuring secure access to and controlled use of resources in the vehicle. The security measures relied on by the security controller can be based on digital certificates that grant rights to certificate holders, e.g., application developers. In the case in which applications are to be used with vehicle resources, procedures are implemented to make sure that certified applications do not jeopardize vehicle resource'"'"'0 security and vehicle users'"'"' safety. Relationships among interested entities are established to promote and support secure vehicle resource access and usage. The entities can include vehicle makers, communication service providers, communication apparatus vendors, vehicle subsystem suppliers, application developers, as well as vehicle owners/users. At least some of the entities can be members of a federation established to enhance and facilitate secure access and usage of vehicle resources.
-
Citations
37 Claims
-
1. A method for controlling use of proprietary resources associated with a vehicle, comprising:
-
providing resources including proprietary resources associated with a vehicle including a plurality of the following;
a first bus, a first interface, a first display, a first vehicle device, a first subsystem, a first application, and a second application;
establishing a plurality of relationships involving at least three entities, wherein first and second entities of said at least three entities has proprietary rights in at least first and second proprietary resources, respectively, and each of said three entities accepts a plurality of conditions related to use of said at least first proprietary resource; and
performing at least a first function after said establishing while making use of at least said first and second proprietary resources. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19, 20, 21, 22)
-
-
23. A system for controlling use of proprietary resources in a vehicle, comprising:
-
resources including proprietary resources for use in the vehicle including a plurality of the following;
a first bus, a first vehicle device, a first subsystem, a first display, a first application, a second application and a first interface; and
a security controller communicating with at least a first of said proprietary resources wherein said security controller controls use of at least said first proprietary resource utilizing certificate information that includes stored certificate information accessible by said security controller that relates to approval of use of said at least first proprietary resource by a first certificate holder of a first certificate, wherein said approval involves at least a first entity having proprietary rights associated with said at least first proprietary resource. - View Dependent Claims (24, 25, 26, 27, 28, 29, 30)
-
-
31. A method for securely controlling access and use related to a target provider involving a vehicle having a security controller, comprising:
-
providing a security system that includes a security controller in a vehicle;
requesting a target provider;
obtaining first information using said security controller related to authorizing use of said target provider by a requesting application; and
determining use related to said target provider based on said first information. - View Dependent Claims (32, 33, 34, 35, 36, 37)
-
Specification