Electronic module update detection
First Claim
Patent Images
1. A method for detecting an unauthorized programming of an electronic module located onboard a vehicle, comprising the steps of:
- obtaining, via a wireless carrier system, information that identifies software for programming an electronic module on a vehicle;
comparing the obtained information with identifying information of authorized software for programming the electronic module using a vehicle telematics unit;
determining a location of the vehicle using vehicle hardware on the vehicle;
comparing the location of the vehicle with authorized programming locations; and
determining whether the programming of the electronic module is authorized based on the comparison of the obtained information with the identifying information and the location of the vehicle with the authorized programming locations.
14 Assignments
0 Petitions
Accused Products
Abstract
A method for detecting an unauthorized programming or installation of software on an electronic module on a vehicle. The method obtains information regarding programming of the electronic module. The information may be obtained by detecting a programming session of the electronic module or after the module has been programmed. The obtained information is compared with information identifying whether programming of the electronic module is authorized or unauthorized. A determination whether the programming is authorized or unauthorized is made based on the comparison.
9 Citations
19 Claims
-
1. A method for detecting an unauthorized programming of an electronic module located onboard a vehicle, comprising the steps of:
-
obtaining, via a wireless carrier system, information that identifies software for programming an electronic module on a vehicle; comparing the obtained information with identifying information of authorized software for programming the electronic module using a vehicle telematics unit; determining a location of the vehicle using vehicle hardware on the vehicle; comparing the location of the vehicle with authorized programming locations; and determining whether the programming of the electronic module is authorized based on the comparison of the obtained information with the identifying information and the location of the vehicle with the authorized programming locations. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11)
-
-
12. A method for detecting an unauthorized programming of an electronic module located onboard a vehicle, comprising the steps of:
-
detecting programming of an electronic module using a vehicle telematics unit; accessing a log of software programming sessions that includes an identity of the electronic module and either the number of times the electronic module has been previously programmed or a time at which the electronic module was programmed, or both; comparing the log of software programming sessions with previously-authorized software programming sessions; and determining whether the programming is authorized based on a comparison between the log of programming sessions and a list of previously-authorized software programming sessions. - View Dependent Claims (13, 14, 15, 16, 17, 18)
-
-
19. A method for detecting an unauthorized programming of an electronic module located onboard a vehicle, comprising the steps of:
-
monitoring a vehicle communication bus with an in-vehicle telematics module for messages indicating a start of a programming session for the electronic module; detecting a message indicating the start of the programming session for the electronic module; querying the electronic module for a software identification after completion of the programming session; performing a cyclic redundancy check of software on the electronic module to obtain a checksum; communicating the software identification and the checksum from the in-vehicle telematics module to a call center; and determining from the software identification and the checksum whether the programming of the module was authorized.
-
Specification