Controlling access to personal information stored in a vehicle using a cryptographic key
First Claim
Patent Images
1. A method of providing user information in a vehicle, comprising the steps of:
- detecting at a first electronic control unit (ECU) installed on the vehicle a wireless signal sent from a wireless transmitter of a device that is separate from the first ECU and a second ECU installed on the vehicle;
in response to the detection, providing over a vehicle network a cryptographic key;
receiving the cryptographic key at the second ECU and temporarily storing the cryptographic key in a volatile memory of the second ECU;
authenticating the cryptographic key at the second ECU;
providing user information via the second ECU based on the authentication; and
storing the cryptographic key on the vehicle in a non-volatile memory installed in a physically separate location on the vehicle from the second ECU, the second ECU containing the user information, such that removal of the second ECU from the vehicle separates the second ECU from the stored cryptographic key, thereby inhibiting access to the user information.
1 Assignment
0 Petitions
Accused Products
Abstract
A system and a method are disclosed providing user information in a vehicle. The method includes the steps of: providing over a vehicle network a cryptographic key in response to receiving a wireless signal from a wireless transmitter at a first electronic control unit (ECU); receiving at a second ECU the cryptographic key; authenticating the cryptographic key at the second ECU; and providing user information via the second ECU based on the authentication.
-
Citations
21 Claims
-
1. A method of providing user information in a vehicle, comprising the steps of:
-
detecting at a first electronic control unit (ECU) installed on the vehicle a wireless signal sent from a wireless transmitter of a device that is separate from the first ECU and a second ECU installed on the vehicle; in response to the detection, providing over a vehicle network a cryptographic key; receiving the cryptographic key at the second ECU and temporarily storing the cryptographic key in a volatile memory of the second ECU; authenticating the cryptographic key at the second ECU; providing user information via the second ECU based on the authentication; and storing the cryptographic key on the vehicle in a non-volatile memory installed in a physically separate location on the vehicle from the second ECU, the second ECU containing the user information, such that removal of the second ECU from the vehicle separates the second ECU from the stored cryptographic key, thereby inhibiting access to the user information. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19)
-
-
20. A method of providing user information in a vehicle, comprising the steps of:
-
receiving a trigger signal at a first electronic control unit (ECU) installed on the vehicle, the trigger signal received from a wireless transmitter not installed on the vehicle, wherein receipt of the trigger signal indicates the presence of an authorized user at the vehicle; in response to the trigger signal, providing over a vehicle network a decryption key from the first ECU to the second ECU, the second ECU associated with a personal user information database based on the trigger signal; temporarily storing the cryptographic key in a volatile memory of the second ECU, and authenticating the decryption key at the second ECU; providing personal user information from the database based on the authentication; and storing the cryptographic key on the vehicle in a non-volatile memory installed in a physically separate location on the vehicle from the second ECU, the second ECU containing the user information, such that removal of the second ECU from the vehicle separates the second ECU from the stored cryptographic key, thereby inhibiting access to the user information. - View Dependent Claims (21)
-
Specification