CONTROLLING ACCESS TO PERSONAL INFORMATION STORED IN A VEHICLE USING A CRYPTOGRAPHIC KEY
First Claim
Patent Images
1. A method of providing user information in a vehicle, comprising the steps of:
- providing over a vehicle network a cryptographic key in response to receiving a wireless signal from a wireless transmitter at a first electronic control unit (ECU);
receiving at a second ECU the cryptographic key;
authenticating the cryptographic key at the second ECU; and
providing user information via the second ECU based on the authentication.
1 Assignment
0 Petitions
Accused Products
Abstract
A system and a method are disclosed providing user information in a vehicle. The method includes the steps of: providing over a vehicle network a cryptographic key in response to receiving a wireless signal from a wireless transmitter at a first electronic control unit (ECU); receiving at a second ECU the cryptographic key; authenticating the cryptographic key at the second ECU; and providing user information via the second ECU based on the authentication.
30 Citations
19 Claims
-
1. A method of providing user information in a vehicle, comprising the steps of:
-
providing over a vehicle network a cryptographic key in response to receiving a wireless signal from a wireless transmitter at a first electronic control unit (ECU); receiving at a second ECU the cryptographic key; authenticating the cryptographic key at the second ECU; and providing user information via the second ECU based on the authentication. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 19)
-
-
18. A method of providing user information in a vehicle, comprising the steps of:
-
receiving a trigger signal at a first electronic control unit (ECU) in the vehicle, wherein receipt of the trigger signal indicates the presence of an authorized user at the vehicle; providing over a vehicle network a decryption key from the first ECU to a second ECU associated with a personal user information database based on the trigger signal; authenticating the decryption key at the second ECU; and providing personal user information from the database based on the authentication.
-
Specification