Methods and arrangements for limiting access to computer controlled functions and devices
First Claim
1. A method comprising:
- verifying that a first application is authorized to set an initial range for a controlled parameter setting of a device;
when it has been verified that the first application is authorized, allowing the first application to set an initial range for the controlled parameter setting of the device, where the first application is not allowed to set the initial range until it has been verified that it is authorized; and
in response to the first application setting the initial range, allowing at least a second application to modify the controlled parameter setting within the initial range set by the first application.
2 Assignments
0 Petitions
Accused Products
Abstract
Methods and arrangements are provided to verify if a requesting computer application is authorized to change a controlled parameter associated with a computer controlled device and/or function. To accomplish this, one or verification functions are employed to analyze a security code or absence thereof, as identified by a requesting application. If the security code, which may be encrypted, matches a known or calculated valid security code, then the requesting application is deemed to be authorized to change the controlled parameter and/or modify certain limitations associated with an acceptable range for the controlled parameter. If the security code does not match a known or calculated valid security code, then the requesting application is deemed to be unauthorized to change the controlled parameter outside of a previously established acceptable range for the controlled parameter. The verification function can be implemented in a ROM to increase the security and to thwart attempts to circumvent the authorization scheme. Several independent verification functions can be arranged to support the verification of a plurality of authorized applications.
22 Citations
47 Claims
-
1. A method comprising:
-
verifying that a first application is authorized to set an initial range for a controlled parameter setting of a device; when it has been verified that the first application is authorized, allowing the first application to set an initial range for the controlled parameter setting of the device, where the first application is not allowed to set the initial range until it has been verified that it is authorized; and in response to the first application setting the initial range, allowing at least a second application to modify the controlled parameter setting within the initial range set by the first application. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17)
-
-
18. A computer-readable medium having computer-executable instructions for performing steps comprising:
-
verifying that a first application is authorized to set an initial range for a controlled parameter setting of a device; when it has been verified that the first application is authorized, allowing the first application to set an initial range for the controlled parameter setting of the device, where the first application is not allowed to set the initial range until it has been verified that it is authorized; and in response to the first application setting the initial range, allowing at least a second application to modify the controlled parameter setting within the initial range set by the first application. - View Dependent Claims (19, 20, 21, 22, 23, 24, 25, 26, 27, 28, 29, 30, 31, 32, 33, 34)
-
-
35. A computer-readable storage medium having computer-executable instructions for performing steps comprising:
-
monitoring an audio system within a vehicle for a request to modify a controlled parameter and an authorized range for a controlled parameter; receiving a first request by an application to set the authorized range for the controlled parameter; verifying that the application is authorized to modify an authorized range for a controlled parameter of the audio system, the verifying comprising; analyzing the request to determine whether it is accompanied by a pointer to a security code stored in a memory, wherein the request is further analyzed to determine whether the request originates from a predefined memory location in a read only portion of a memory, and analyzing the security code to determine whether it matches at least one of a plurality of security codes associated with an authorized application; when the verifying determines the application is authorized, actively allowing the application to set an authorized range and a current value for the controlled parameter; when the verifying determines the application is unauthorized, restricting the application to setting the current value of the controlled parameter to be within a pre-established limit of the authorized range, wherein the application is restricted from setting the authorized range; receiving a second request to change the current value of the controlled parameter from the application, wherein the second request to change the current value of the controlled parameter is outside the authorized range; determining that the application has been previously authorized according to the verifying; changing the current value of the controlled parameter to the requested value of the second request; otherwise, verifying that the application is authorized to modify the authorized range for the controlled parameter, prior to changing the current value of the controlled parameter to the requested value using the verifying. - View Dependent Claims (36, 37, 38, 39)
-
-
40. A vehicle computer system comprising:
-
a processor; and a memory coupled to the processor to facilitate storage of one or more of; a parameter manager configurable to receive a parameter change request from one or more computer applications and selectively output a corresponding parameter value to one or more vehicle component controls; at least one verifier function accessible by the parameter manager and configured to determine if the parameter change request is from a computer application that is authorized to exceed a parameter limitation for the one or more vehicle component controls; and a device driver coupled to the parameter manager and configured to receive the parameter value from the parameter manager and output a corresponding control parameter suitable for use by the processing device. - View Dependent Claims (41, 42, 43, 44, 45, 46, 47)
-
Specification