Secure telematics
First Claim
1. A method of providing access to resources, comprising:
- receiving at a security controller located within a vehicle a request to access a first proprietary resource located within the vehicle;
determining by the security controller a plurality of factors indicating a degree of risk associated with the request;
establishing security conditions that are required to be met in order to grant the request to access the first proprietary resource, wherein the security conditions include receiving location information by the security controller indicating a location of the vehicle when the request to access the first proprietary resource is received, and wherein the location information includes trusted time and location information;
providing the trusted time and location information from a second proprietary resource located within the vehicle to the security controller;
in response to receiving the trusted time and location information and verifying by the security controller that the security conditions have been met, the security controller granting the requested access to the first proprietary resource;
providing first information from the first proprietary resource.
3 Assignments
0 Petitions
Accused Products
Abstract
A telematics system that includes a security controller is provided. The security controller is responsible for ensuring secure access to and controlled use of resources in the vehicle. The security measures relied on by the security controller can be based on digital certificates that grant rights to certificate holders, e.g., application developers. In the case in which applications are to be used with vehicle resources, procedures are implemented to make sure that certified applications do not jeopardize vehicle resources'"'"' security and vehicle users'"'"' safety. Relationships among interested entities are established to promote and support secure vehicle resource access and usage. The entities can include vehicle makers, communication service providers, communication apparatus vendors, vehicle subsystem suppliers, application developers, as well as vehicle owners/users. At least some of the entities can be members of a federation established to enhance and facilitate secure access and usage of vehicle resources.
-
Citations
25 Claims
-
1. A method of providing access to resources, comprising:
-
receiving at a security controller located within a vehicle a request to access a first proprietary resource located within the vehicle; determining by the security controller a plurality of factors indicating a degree of risk associated with the request; establishing security conditions that are required to be met in order to grant the request to access the first proprietary resource, wherein the security conditions include receiving location information by the security controller indicating a location of the vehicle when the request to access the first proprietary resource is received, and wherein the location information includes trusted time and location information; providing the trusted time and location information from a second proprietary resource located within the vehicle to the security controller; in response to receiving the trusted time and location information and verifying by the security controller that the security conditions have been met, the security controller granting the requested access to the first proprietary resource; providing first information from the first proprietary resource. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10)
-
-
11. A communication system, comprising:
-
a wireless communication device; a first proprietary resource, wherein a first entity holds rights to the first proprietary resource; a second proprietary resource, wherein a second entity holds rights to the second proprietary resource, and wherein the second proprietary resource provides trusted vehicle location information; a security controller, wherein the wireless communication device, the first proprietary resource, the second proprietary resource, and the security controller located within a vehicle are in communication with one another, wherein the security controller is operable to monitor communications between the wireless communication device, the first proprietary resource, and the second proprietary resource, wherein the security controller operates so that only communications that are authenticated by the security controller are allowed between the wireless communication device and the first proprietary resource and between the wireless communication device and the second proprietary resource, and wherein at least some communications are authenticated only when the vehicle location information indicates that the vehicle is in an authorized location. - View Dependent Claims (12, 13, 14, 15, 16, 17, 18, 19)
-
-
20. A method for controlling utilization of resources in a vehicle, comprising:
-
receiving by a wireless communication device located in the vehicle first information, wherein the first information includes vehicle location information; authenticating the first information by a security controller located in the vehicle; in response to authenticating the first information, passing the first information to a first proprietary resource, wherein the first proprietary resource is located within the vehicle, and wherein rights in the first proprietary resource are held by a first entity; generating in the first proprietary resource located in the vehicle second information; in response to determining from the vehicle location information that the vehicle is in an authorized location, authenticating the second information by the security controller; in response to authenticating the second information, passing the second information to the wireless communication device for transmission. - View Dependent Claims (21, 22, 23, 24, 25)
-
Specification