Secure home-to-vehicle wireless connectivity
First Claim
1. A method for securing a communications link between a vehicle communications system and a computer through a wireless access point, said method comprising:
- providing a wireless connection between the vehicle communications system and the wireless access point;
providing a connection between the computer and the wireless access point;
causing a user of the computer to initiate a communication with the vehicle communications system through the wireless access point;
causing the vehicle communications system to send a challenge to the computer to authenticate the user; and
establishing a secure communications link between the vehicle communications system and the computer if the computer responds to the challenge with a correct response.
12 Assignments
0 Petitions
Accused Products
Abstract
A method for providing a secure communications link between a home PC and a vehicle through a wireless access point. The method includes providing a wireless connection between a vehicle communications system and the wireless access point and causing a user of the PC to initiate a communication with the vehicle communications system through the wireless access point so as to allow the user to send information to the vehicle from the home PC. The method also includes causing the vehicle communications system to send an authentication challenge to the PC, such as identifying a user name and password, to authorize the user to communicate with the vehicle communications system, and establishing a secure communications link between the vehicle communications system and the PC if the user responds to the challenge with a correct response.
-
Citations
20 Claims
-
1. A method for securing a communications link between a vehicle communications system and a computer through a wireless access point, said method comprising:
-
providing a wireless connection between the vehicle communications system and the wireless access point; providing a connection between the computer and the wireless access point; causing a user of the computer to initiate a communication with the vehicle communications system through the wireless access point; causing the vehicle communications system to send a challenge to the computer to authenticate the user; and establishing a secure communications link between the vehicle communications system and the computer if the computer responds to the challenge with a correct response. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10)
-
-
11. A method for securing a communications link between a vehicle communications system and a computer through a wireless access point, said method comprising:
-
providing a wireless connection between the vehicle communications system and the wireless access point; providing a connection between the computer and the wireless access point; causing a user of the computer to initiate a communication with the vehicle communications system through the wireless access point using a web browser; causing the vehicle communications system to send an authentication network page to the computer asking the user for a user name and password; establishing a secure communications link between the vehicle communications system and the computer if the computer provides a correct user name and password; and providing configuration network pages to the computer to allow the user to make changes to the vehicle once the secure communications link has been established. - View Dependent Claims (12, 13, 14, 15, 16)
-
-
17. A method for securing a communications link between a vehicle communications system and a computer through a wireless access point, said method comprising:
-
providing a wireless connection between the vehicle communications system and the wireless access point; providing a connection between the computer and the wireless access point; and causing the vehicle communications system to verify that a user of the computer is authenticated to communicate with the vehicle before allowing the user to change vehicle settings wirelessly from the computer. - View Dependent Claims (18, 19, 20)
-
Specification