METHODS, APPARATUS AND SYSTEMS FOR ACCESSING VEHICLE OPERATIONAL DATA USING AN INTELLIGENT NETWORK ROUTER
First Claim
Patent Images
1. ) A system for securely accessing a source of data from a vehicle, comprising:
- an internet protocol (IP) network;
a remote communication device in communication with the IP network, the remote communication device being configured to transmit and receive data; and
a first intermediary computing device within the IP network, the intermediary computing device preventing communication between the remote communication device and the source of the data, wherein the first intermediary computing device is configured to allow communications between the remote communication device and the source of the data when the first intermediary computing device determines that a first source internet protocol (SrcIP) address of the remote communication device is an authorized first SrcIP address.
1 Assignment
0 Petitions
Accused Products
Abstract
Systems and methods are provided that allow more efficient access to vehicle health maintenance information within a vehicle. In addition, it is desirable to provide remote access to the health information by a plurality of users.
-
Citations
20 Claims
-
1. ) A system for securely accessing a source of data from a vehicle, comprising:
-
an internet protocol (IP) network; a remote communication device in communication with the IP network, the remote communication device being configured to transmit and receive data; and a first intermediary computing device within the IP network, the intermediary computing device preventing communication between the remote communication device and the source of the data, wherein the first intermediary computing device is configured to allow communications between the remote communication device and the source of the data when the first intermediary computing device determines that a first source internet protocol (SrcIP) address of the remote communication device is an authorized first SrcIP address. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11)
-
-
12. ) A method for securely accessing a source of data, comprising:
-
receiving a tunnel request message from a remote communication device, the remote communication device having a first source IP (SrcIP) address; determining if the first SrcIP address is an authorized first SrcIP address; if the first SrcIP address is an authorized first SrcIP address then establishing an IP tunnel by assigning a second SrcIP address to the remote communication device, wherein the second SrcIP address is an automatically recognized authorized SrcIP address, otherwise rejecting the tunnel request message; and sending a reply message to the remote communication device with the second SrcIP address acknowledging access to the source of the data. - View Dependent Claims (13, 14, 15)
-
-
16. ) A method for securely accessing a source of data, comprising:
-
receiving a connection request message from a computing device within a network, the connection request message including a first source IP (SrcIP) address and an embedded second SrcIP address; determining if the first SrcIP address is an authorized SrcIP address; and if the first SrcIP address is an authorized SrcIP address then granting a communication session to the computing device with the first SrcIP address allowing access to the source of the data, otherwise rejecting the connection request message. - View Dependent Claims (17, 18, 19, 20)
-
Specification