System and method of intelligent agent identification for vehicle diagnostics
First Claim
1. A method of intelligent agent identification for a vehicle, said method including the steps of:
- selecting an intelligent agent by a host computer system, wherein the host computer system includes a processor, a memory associated with the processor and an input/output means, the memory having a plurality of identification numbers and a plurality of predetermined identification codes generated using at least one of the identification numbers;
selecting a slave system to receive the intelligent agent, by the host computer system;
encrypting a work activity to be performed by the intelligent agent, and encrypting predetermined host computer system identification information and programming the encrypted work activity and predetermined host computer system identification information into the selected intelligent agent by the host computer system;
selecting an identification code for the selected intelligent agent by the host computer system and programming the identification code into the selected intelligent agent;
transmitting the intelligent agent to the selected slave system, wherein the selected slave system includes a slave computer system having a processor, a memory associated with the processor and an input/output means, the memory having the plurality of identification numbers and the plurality of predetermined identification codes generated using the identification numbers, and the host computer system and slave computer system are operatively in communication with each other via a communication network;
decoding the host computer system identification information carried by the selected intelligent agent by the slave computer system;
determining if the decoded host computer system identification information matches corresponding host computer system identification information stored in the memory of the slave computer system;
denying access to the slave computer system if the decoded host computer system identification information carried by the intelligent agent does not correspond with host computer system identification information stored in the memory of the slave computer system;
continuing to check the identity of the intelligent agent if the decoded host computer system identification information carried by the intelligent agent does correspond with host computer system identification information stored in the memory of the slave computer system, by deciphering the identification code into the identification numbers and determining if the identification code and the identification numbers match the predetermined identification code and the identification numbers stored in the memory of the slave computer system;
denying access to the slave computer system if either of the identification code or the identification numbers carried by the intelligent agent do not match the predetermined identification code or the identification numbers stored in the memory of the slave computer system; and
allowing the intelligent agent access to the slave computer system if the identification code and the identification numbers carried by the intelligent agent matches the predetermined identification code and identification numbers stored in the memory of the slave computer system.
3 Assignments
0 Petitions
Accused Products
Abstract
A system and method of intelligent agent identification for a vehicle is provided. The method including the steps of a host computer system selecting an intelligent agent and determining a slave system to receive the intelligent agent. The host system encrypts a work activity to be performed by the agent, and predetermined host identification information, and programs the encrypted work activity and predetermined host information into the selected agent. The methodology randomly generates an identification code for the selected agent and programs the code into the selected agent. The selected agent is transmitted to the selected slave system via a communication network. The slave computer system decodes the host information and agent identification code carried by the agent, and determines if the decoded host information matches corresponding host identification information stored in memory of the slave computer system. The agent is denying access to the slave computer system if the decoded host information does not correspond. The methodology continues to check the agent identity by determining if the decoded agent identification code matches a predetermined identification code stored in the memory of the slave computer system. The agent is denied access to the slave computer system if there is no match, and is allow access to the slave computer system if the decoded agent identification information matches the predetermined identification code stored in the memory of the slave computer system.
-
Citations
14 Claims
-
1. A method of intelligent agent identification for a vehicle, said method including the steps of:
-
selecting an intelligent agent by a host computer system, wherein the host computer system includes a processor, a memory associated with the processor and an input/output means, the memory having a plurality of identification numbers and a plurality of predetermined identification codes generated using at least one of the identification numbers; selecting a slave system to receive the intelligent agent, by the host computer system; encrypting a work activity to be performed by the intelligent agent, and encrypting predetermined host computer system identification information and programming the encrypted work activity and predetermined host computer system identification information into the selected intelligent agent by the host computer system; selecting an identification code for the selected intelligent agent by the host computer system and programming the identification code into the selected intelligent agent; transmitting the intelligent agent to the selected slave system, wherein the selected slave system includes a slave computer system having a processor, a memory associated with the processor and an input/output means, the memory having the plurality of identification numbers and the plurality of predetermined identification codes generated using the identification numbers, and the host computer system and slave computer system are operatively in communication with each other via a communication network; decoding the host computer system identification information carried by the selected intelligent agent by the slave computer system; determining if the decoded host computer system identification information matches corresponding host computer system identification information stored in the memory of the slave computer system; denying access to the slave computer system if the decoded host computer system identification information carried by the intelligent agent does not correspond with host computer system identification information stored in the memory of the slave computer system; continuing to check the identity of the intelligent agent if the decoded host computer system identification information carried by the intelligent agent does correspond with host computer system identification information stored in the memory of the slave computer system, by deciphering the identification code into the identification numbers and determining if the identification code and the identification numbers match the predetermined identification code and the identification numbers stored in the memory of the slave computer system; denying access to the slave computer system if either of the identification code or the identification numbers carried by the intelligent agent do not match the predetermined identification code or the identification numbers stored in the memory of the slave computer system; and allowing the intelligent agent access to the slave computer system if the identification code and the identification numbers carried by the intelligent agent matches the predetermined identification code and identification numbers stored in the memory of the slave computer system. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
-
9. A method of intelligent agent identification for a vehicle, said method including the steps of:
-
selecting an intelligent agent by an agent management software program maintained on a host computer system, wherein the host computer system includes a processor, a memory associated with the processor and an input/output means, the memory having a plurality of identification numbers and a plurality of predetermined identification codes generated using at least one of the identification numbers; selecting a slave system to receive the intelligent agent using a host send/receive software program maintained by the host computer system; encrypting a work activity to be performed by the intelligent agent, and encrypting predetermined host computer system identification information and programming the encrypted work activity and predetermined host computer system identification information into the selected intelligent agent; generating a plurality of identification numbers for the selected agent by the host computer system; selecting an identification code for the selected intelligent agent using the host agent management software program and programming the identification code into the selected intelligent agent; transmitting the intelligent agent to the selected slave system, wherein the selected slave system includes a slave computer system having a processor, a memory associated with the processor and an input/output means, the memory having the plurality of identification numbers and the plurality of predetermined identification codes generated using the identification numbers, and the host computer system and slave computer system are operatively in communication with each other via a communication network; decoding the host computer system identification information carried by the selected intelligent agent by a slave identification software program maintained by the slave computer system; determining if the decoded host computer system identification information matches corresponding host computer system identification information stored in the memory of the slave computer system; denying access to the slave computer system if the decoded host computer system identification information carried by the intelligent agent does not correspond with host computer system identification information stored in the memory of the slave computer system; continuing to check the identity of the intelligent agent if the decoded host computer system identification information carried by the intelligent agent does correspond with host computer system identification information stored in the memory of the slave computer system, by deciphering the identification code into the identification numbers and determining if the identification code and the identification numbers matches the predetermined identification code and the identification numbers stored in the memory of the slave computer system; denying access to the slave computer system if either of the identification code or the identification numbers carried on the intelligent agent does not match the predetermined identification code or the identification numbers stored in the memory of the slave computer system; decoding the work activity carried by the intelligent agent if the identification code and the identification numbers carried on the intelligent agent matches the predetermined identification code and predetermined identification numbers stored in the memory of the slave computer system; executing the work activity by the slave computer system and using the intelligent agent to obtain work activity information; encrypting the work activity information obtained by the intelligent agent using the slave application program on the slave computer system and programming the encrypted work activity information into the intelligent agent; regenerating the identification code from the identification numbers for the intelligent agent by the slave identification software program and programming the identification code into the intelligent agent; transmitting the intelligent agent to the host computer system and receiving the intelligent agent by the host agent send/receive software program; decoding the work activity information and separating the identification code from the identification numbers carried on the intelligent agent, by the host identification software program; determining if the identification code and the identification numbers correlates with a predetermined identification code and the identification numbers for the intelligent agent stored in the host computer system by the host identification software program; denying the intelligent agent access to the host computer system, if the identification code and the identification numbers do not match the predetermined identification code and the identification numbers for the intelligent agent; continuing to check the agent identity if the identification code and the identification numbers carried by the intelligent agent do correspond with the predetermined identification code and the predetermined identification numbers stored in the memory of the host computer system, by determining if the decoded work activity information matches a predetermined work information condition; denying access to the host computer system if the decoded work activity information carried by the intelligent agent does not match the predetermined work information condition; and using the work activity information carried by the intelligent agent in vehicle diagnostics, if the decoded information carried on the intelligent agent matches the predetermined work information condition. - View Dependent Claims (10)
-
-
11. A system of intelligent agent identification and management for a vehicle having an intelligent agent, comprising:
-
a host computer system having a processor, a memory associated with the processor and an input/output means, a host agent send/receive software program maintained by the host computer system that admits the intelligent agent into the host computer system and sends the intelligent agent out of the host computer system, the memory having a plurality of identification numbers and a plurality of identification codes generated using at least one of the identification numbers; a host identification software program maintained by the host computer system that manages the identity of the intelligent agent and the activity of the intelligent agent; an agent management software program operatively maintained by the host computer system, wherein the agent management software program selects an intelligent agent and a slave system to receive the intelligent agent, encrypts an action to be performed by the intelligent agent, selects an identification code for the selected intelligent agent, encrypts the host computer system identification information and programs the generated identification code and host computer system identification information onto the selected intelligent agent; a slave computer system on the vehicle that is operatively in communication with the host computer system via a communication network, wherein the slave computer system has a processor, a memory associated with the processor and an input/output means, the memory having the plurality of identification numbers and the plurality of predetermined identification codes generated using at least one of the identification numbers; a slave identification software program maintained by the slave computer system, wherein the slave identification program identifies the intelligent agent received by the slave computer system by decoding the host computer system identification information carried by the selected intelligent agent, determines if the decoded host computer system identification information matches corresponding host computer system identification information stored in memory of the slave computer system, and denies access to the slave computer system if the decoded host computer system identification information carried by the intelligent agent does not correspond and continues to check the identity of the agent by deciphering the identification code into the identification numbers and determines if the identification code and the identification numbers match a predetermined identification code and the identification numbers stored in the memory of the slave computer system and denies the intelligent agent access to the slave computer system if the identification code and the identification numbers do not match the predetermined identification code and the identification numbers stored in the memory of the slave computer system and decodes the information carried by the intelligent agent if the decoded information carried by the intelligent agent matches the predetermined condition; and a slave application software program that is part of the slave computer system that executes the work activity instructions carried by the identified agent to obtain information about the vehicle that is used in vehicle diagnostics. - View Dependent Claims (12, 13, 14)
-
Specification