Method and Apparatus for Remote Authentication
First Claim
1. A computer-implemented authentication method comprising:
- receiving a request to access one or more features of a vehicle computing system (VCS) from an application running on a wireless device in communication with the VCS;
preparing a secure access rights request to a remote server including one or more characteristics associated with the application;
sending the secure request from the VCS, through the wireless device to the remote server;
receiving a response to the request having been sent from the remote server through the wireless device;
verifying the authenticity of the received response;
updating a policy table including information from the received response, the information including at least an expiration trigger and access rights for the application; and
validating the application for use in conjunction with the VCS based at least on the information included in the updated policy table.
1 Assignment
0 Petitions
Accused Products
Abstract
A computer-implemented authentication method includes receiving a request to access one or more features of a vehicle computing system (VCS) from an application running on a wireless device in communication with the VCS. The method further includes preparing a secure access rights request to a remote server including one or more characteristics associated with the application and sending the secure request from the VCS, through the wireless device to the remote server. The method additionally includes receiving a response to the request having been sent from the remote server through the wireless device. The method includes verifying the authenticity of the received response and updating a policy table including information from the received response, the information including at least an expiration trigger and access rights for the application. Also, the method includes validating the application for usage based at least on the information included in the updated policy table.
-
Citations
21 Claims
-
1. A computer-implemented authentication method comprising:
-
receiving a request to access one or more features of a vehicle computing system (VCS) from an application running on a wireless device in communication with the VCS; preparing a secure access rights request to a remote server including one or more characteristics associated with the application; sending the secure request from the VCS, through the wireless device to the remote server; receiving a response to the request having been sent from the remote server through the wireless device; verifying the authenticity of the received response; updating a policy table including information from the received response, the information including at least an expiration trigger and access rights for the application; and validating the application for use in conjunction with the VCS based at least on the information included in the updated policy table. - View Dependent Claims (2, 3, 4, 5)
-
-
6. A computer-implemented authentication method comprising:
-
compiling a list of applications currently approved for use in conjunction with a vehicle computing system; transmitting the list to a remote server for processing; receiving a processed response to the transmission; determining one or more applications not authorized for use with the vehicle computing system based on the response; and disabling the one or more applications not authorized for use. - View Dependent Claims (7, 8, 9, 10, 11)
-
-
12. An authentication system comprising:
-
a vehicle computing system operable to provide access to components thereof to one or more applications running on a device wirelessly connected thereto; a remote authentication server in communication with the vehicle computing system through the device; wherein, upon receiving a request for system access or resource usage from an application, the vehicle computing system is operable to request authentication of the rights of the application from the remote server, the request including sending one or more application credentials to the remote server through the device on which the application is running, wherein, upon receiving the request from the vehicle computing system, the server is operable to determine access rights for the application and transmit a signed policy table in response to the request from the vehicle computing system, the policy table including access rights for the application and being transmitted through the device, wherein, upon receipt of the policy table, the vehicle computing system is operable to authenticate the application based on information contained in the policy table and to allow the application to access the system or resource requested by the application. - View Dependent Claims (13, 14, 15, 16, 17, 18, 19, 20, 21)
-
Specification