SECURE TELEMATICS
First Claim
1. A communication system comprising:
- a security controller located within a first vehicle;
a wireless communication device located within the first vehicle and interconnected to the security controller; and
a first proprietary resource located within the first vehicle and interconnected to the security controller, wherein the first proprietary resource is proprietary to a first entity,wherein at least one of the wireless communication device and a second proprietary resource are proprietary to a second entity, and wherein the security controller is operable to allow transmission of information associated with the first proprietary resource from the wireless communication device in response to the security controller authenticating at least two of a number of factors associated with the system.
2 Assignments
0 Petitions
Accused Products
Abstract
A telematics system that includes a security controller is provided. The security controller is responsible for ensuring secure access to and controlled use of resources in the vehicle. The security measures relied on by the security controller can be based on digital certificates that grant rights to certificate holders, e.g., application developers. In the case in which applications are to be used with vehicle resources, procedures are implemented to make sure that certified applications do not jeopardize vehicle resources'"'"' security and vehicle users'"'"' safety. Relationships among interested entities are established to promote and support secure vehicle resource access and usage. The entities can include vehicle makers, communication service providers, communication apparatus vendors, vehicle subsystem suppliers, application developers, as well as vehicle owners/users. At least some of the entities can be members of a federation established to enhance and facilitate secure access and usage of vehicle resources.
17 Citations
20 Claims
-
1. A communication system comprising:
-
a security controller located within a first vehicle; a wireless communication device located within the first vehicle and interconnected to the security controller; and a first proprietary resource located within the first vehicle and interconnected to the security controller, wherein the first proprietary resource is proprietary to a first entity, wherein at least one of the wireless communication device and a second proprietary resource are proprietary to a second entity, and wherein the security controller is operable to allow transmission of information associated with the first proprietary resource from the wireless communication device in response to the security controller authenticating at least two of a number of factors associated with the system. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A secure delivery system comprising:
-
a security controller located within a vehicle, the vehicle configured to carry an object for delivery to a delivery location; a communication device located within the vehicle and interconnected to the security controller; and a first proprietary resource located with the vehicle and interconnected to the security controller, the first proprietary resource including a global positioning system providing location information of the vehicle, wherein the security controller is configured to enable delivery of the location information of the vehicle through the communication device to an entity to which the object is being delivered based on the security controller authenticating information provided by the entity to which the object is being delivered. - View Dependent Claims (9, 10, 11, 12, 13)
-
-
14. A communication system comprising:
-
a mobile communication device; a first proprietary resource; and a security controller, wherein the mobile communication device, the first proprietary resource, and the security controller are co-located with each other, wherein the security controller includes a processor and is configured to enable communications between the mobile communication device and the first proprietary resource, wherein such communications are enabled only when authenticated by the security controller, and wherein, in response to a request from the mobile communication device that is authenticated by the security controller based on the receipt of at least a first assertion by the security controller, the security controller allows configuration information provided by the mobile communication device to be transmitted by the mobile communication device to the first proprietary resource. - View Dependent Claims (15, 16, 17, 18, 19, 20)
-
Specification