Wireless Device As Programmable Vehicle Key
First Claim
1. A method for providing secure operation of a vehicle comprising:
- detecting a key for accessing a vehicle;
retrieving a vehicle operation policy from a first database, where the vehicle operation policy is associated with the key, and;
permitting operation of the vehicle consistent with the vehicle operation policy.
4 Assignments
0 Petitions
Accused Products
Abstract
Methods and wireless devices for providing secure operation of a vehicle. In one such method, a key for accessing a vehicle is detected, a vehicle operation policy associated with the key is retrieved, and operation of the vehicle consistent with the vehicle operation policy is permitted. The key may be embedded within a wireless device such as a cellular telephone. The vehicle operation policy may include an access control rule that may indicate to enable, partially enable, or disable a vehicle operation feature. Where the intended operation of the vehicle is not consistent with the access control rule, the operation may not be permitted and an enforcement action may be taken, such as disabling a feature of the vehicle.
-
Citations
26 Claims
-
1. A method for providing secure operation of a vehicle comprising:
-
detecting a key for accessing a vehicle; retrieving a vehicle operation policy from a first database, where the vehicle operation policy is associated with the key, and; permitting operation of the vehicle consistent with the vehicle operation policy. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13)
-
-
14. A method for providing secure operation of a vehicle, the method comprising:
-
receiving a request to update a first database from a computing device, wherein the request comprises a vehicle identifier, a secure key identifier, and an access control rule; querying a first database to locate a first record, that is associated with the vehicle identifier; updating the first record to reflect the access control rule; and synchronizing the first record with a corresponding second record in a second database. - View Dependent Claims (15, 16, 17, 18, 19)
-
-
20. A wireless device for providing secure operation of a vehicle comprising:
-
a user interface module that receives a first request to gain access to a vehicle and that receives a second request to update an access control rule; a memory that stores a secure identifier of the wireless device; a processor that retrieves the secure identifier from the memory in response to the first request; a vehicle access module that sends the secure identifier to the vehicle; and a wireless communications module that sends the second request. - View Dependent Claims (21, 22, 23, 24, 25, 26)
-
Specification