Authenticating a short message service (SMS) message
First Claim
1. Vehicle hardware for authenticating an SMS message received in a vehicle, comprising a processor and electronic memory that is accessible by the processor and that has stored thereon a program which is operable upon execution by the processor to carry out the steps of:
- (a) determining a vehicle key for the vehicle telematics unit;
(b) wirelessly receiving an SMS message at the telematics unit, wherein the SMS message includes a payload section having information related to a security code;
(c) generating a security code using a mathematical function and the vehicle key; and
(d) comparing the payload section information received in step (b) with the security code generated in step (c) to authenticate the SMS message;
wherein the mathematical function utilizes a keyed-hash message authentication code (HMAC).
2 Assignments
0 Petitions
Accused Products
Abstract
A vehicle telematics unit or other electronic hardware in a vehicle authenticates an incoming SMS message and provides additional security features above and beyond those inherent to the SMS protocol. A call center uses a mathematical function to derive a security code, and then sends an SMS message to the vehicle. The telematics unit can utilize the transmitted information to authenticate the sender of the SMS message and/or its contents. One group of suitable mathematical functions utilizes keyed-hash message authentication codes (HMACs).
-
Citations
14 Claims
-
1. Vehicle hardware for authenticating an SMS message received in a vehicle, comprising a processor and electronic memory that is accessible by the processor and that has stored thereon a program which is operable upon execution by the processor to carry out the steps of:
-
(a) determining a vehicle key for the vehicle telematics unit; (b) wirelessly receiving an SMS message at the telematics unit, wherein the SMS message includes a payload section having information related to a security code; (c) generating a security code using a mathematical function and the vehicle key; and (d) comparing the payload section information received in step (b) with the security code generated in step (c) to authenticate the SMS message; wherein the mathematical function utilizes a keyed-hash message authentication code (HMAC). - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14)
-
Specification