Methods and apparatuses for remote control of vehicle devices and vehicle lock-out notification
First Claim
1. A method to manipulate a vehicle device of a vehicle via a remote access device, comprising:
- generating, by an asymmetric key generation module of a vehicle controller, an encryption key pair to encrypt data to be transferred to the remote access device, wherein the vehicle controller comprises a microprocessor and a trusted platform module (TPM), wherein further the TPM comprises a hash module, a key-hash message authentication code (HMAC) module, and a random number generator;
transferring, via a mobile telephone switching station, encrypted data from the vehicle controller to the remote access device;
decrypting, by the remote access device, the encrypted data via an encryption key of the encryption key pair; and
manipulating the vehicle device via the vehicle controller based upon receipt of a response transmitted by the remote access device, wherein the response is generated in response to the decrypting the encrypted data.
2 Assignments
0 Petitions
Accused Products
Abstract
Methods, systems, and media for remote control of a vehicle device and vehicle lockout notification are disclosed. Embodiments comprise a method of creating a secure bidirectional communication link between a remote access device and a central locking unit (CLU) of a vehicle, enabling the central locking unit to authenticate a user of the remote access device to manipulate a device of the vehicle. In some embodiments, the CLU may wait for an access attempt from a mobile device. In other embodiments, the CLU monitor vehicle conditions, detect a lockout condition, and alert the user before authenticating and granting vehicle access. Embodiments utilize private and shared key encryption methods to facilitate securely passing an access code between the CLU and the remote access device. Some embodiments authenticate the user by voice verification, while other embodiments may use personal identification numbers.
-
Citations
19 Claims
-
1. A method to manipulate a vehicle device of a vehicle via a remote access device, comprising:
-
generating, by an asymmetric key generation module of a vehicle controller, an encryption key pair to encrypt data to be transferred to the remote access device, wherein the vehicle controller comprises a microprocessor and a trusted platform module (TPM), wherein further the TPM comprises a hash module, a key-hash message authentication code (HMAC) module, and a random number generator; transferring, via a mobile telephone switching station, encrypted data from the vehicle controller to the remote access device; decrypting, by the remote access device, the encrypted data via an encryption key of the encryption key pair; and manipulating the vehicle device via the vehicle controller based upon receipt of a response transmitted by the remote access device, wherein the response is generated in response to the decrypting the encrypted data. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11)
-
-
12. An apparatus to control a vehicle device of a vehicle, the apparatus comprising:
-
a key generation module configured to generate asymmetric key pairs; a wireless transmitting circuit to transmit encrypted data to a remote access device via a mobile telephone switching station; a wireless receiving circuit to receive a response from the remote access device, wherein the response is based on decryption of the encrypted data using a key from an asymmetric key pair of the key generation module; and a controller to manipulate the vehicle device based upon receipt of the response from the remote access device, wherein the controller comprises a trusted platform module (TPM), wherein further the TPM comprises a hash module, a key-hash message authentication code (HMAC) module, and a random number generator. - View Dependent Claims (13, 14, 15)
-
-
16. A system, comprising:
-
a communication module configured to communicate with a cellular telephone via a mobile telephone switching station; a random number generator configured to generate an access code; a key generation module configured to generate asymmetric key pairs; an encryption module to encrypt the access code via a first key of an asymmetric key pair; and a controller to manipulate a vehicle device in response to receiving the access code from the remote access device, wherein transmission of the of the access code from the remote access device is based upon decryption of the encrypted access code via a second key of the asymmetric key pair, wherein further the controller comprises a trusted platform module (TPM) with a hash module, a key-hash message authentication code (HMAC) module, and a random number generator. - View Dependent Claims (17, 18, 19)
-
Specification