Wireless device as programmable vehicle key
First Claim
1. A method for providing secure operation of a vehicle comprising:
- detecting a key for accessing a vehicle;
retrieving a vehicle operation policy from a first database, where the vehicle operation policy is associated with the key, such that the vehicle operation policy identifies an access control rule to be enforced when the key is detected, wherein the access control rule is associated with vehicle operation features comprising unlocking a door, opening a trunk, opening a glove box, engaging an ignition, directing the vehicle from a first geographic location to a second geographic location, and accelerating the vehicle;
permitting operation of the vehicle consistent with the vehicle operation policy;
wherein said detecting comprises receiving a secure key identifier from a wireless device; and
wherein the secure identifier comprises an encrypted digital signature.
4 Assignments
0 Petitions
Accused Products
Abstract
Methods and wireless devices for providing secure operation of a vehicle. In one such method, a key for accessing a vehicle is detected, a vehicle operation policy associated with the key is retrieved, and operation of the vehicle consistent with the vehicle operation policy is permitted. The key may be embedded within a wireless device such as a cellular telephone. The vehicle operation policy may include an access control rule that may indicate to enable, partially enable, or disable a vehicle operation feature. Where the intended operation of the vehicle is not consistent with the access control rule, the operation may not be permitted and an enforcement action may be taken, such as disabling a feature of the vehicle.
60 Citations
21 Claims
-
1. A method for providing secure operation of a vehicle comprising:
-
detecting a key for accessing a vehicle; retrieving a vehicle operation policy from a first database, where the vehicle operation policy is associated with the key, such that the vehicle operation policy identifies an access control rule to be enforced when the key is detected, wherein the access control rule is associated with vehicle operation features comprising unlocking a door, opening a trunk, opening a glove box, engaging an ignition, directing the vehicle from a first geographic location to a second geographic location, and accelerating the vehicle; permitting operation of the vehicle consistent with the vehicle operation policy; wherein said detecting comprises receiving a secure key identifier from a wireless device; and wherein the secure identifier comprises an encrypted digital signature. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11)
-
-
12. A method for providing secure operation of a vehicle, the method comprising:
-
receiving a request to update a first database from a computing device, wherein the request comprises a vehicle identifier, a secure key identifier associated with a key, and an access control rule to be enforced when the key is detected, wherein the access control rule is associated with vehicle operation features comprising unlocking a door, opening a trunk, opening a glove box, engaging an ignition, directing the vehicle from a first geographic location to a second geographic location, and accelerating the vehicle; querying a first database to locate a first record, that is associated with the vehicle identifier; updating the first record to reflect the access control rule; and synchronizing the first record with a corresponding second record in a second database. - View Dependent Claims (13, 14, 15, 16)
-
-
17. A wireless device for providing secure operation of a vehicle comprising:
-
a user interface module that receives a first request to gain access to a vehicle and that receives a second request to update an access control rule, wherein the access control rule is associated with vehicle operation features comprising unlocking a door, opening a trunk, opening a glove box, engaging an ignition, directing the vehicle from a first geographic location to a second geographic location, and accelerating the vehicle; a memory that stores a secure identifier of the wireless device; a processor that retrieves the secure identifier from the memory in response to the first request, when the first request is consistent with an access control rule to be enforced when a key is detected; a vehicle access module that sends the secure identifier to the vehicle; and a wireless communications module that sends the second request. - View Dependent Claims (18, 19, 20, 21)
-
Specification