Controlling access to a vehicle using wireless access devices
First Claim
1. A method for controlling access to a vehicle, the method comprising:
- maintaining, by a security system controller of the vehicle, a plurality of security profiles, each security profile associated with a different access device or type of access device;
detecting, by the security system controller through a wireless communications interface, presence of an access device in proximity to the vehicle or a request to access the vehicle;
retrieving, by the security system controller from the plurality of security profiles, a security profile associated with the detected access device or the request to access the vehicle;
determining, by the security system controller, whether to grant access to the vehicle based on the detected access device or the request to access the vehicle and the retrieved security profile, wherein determining whether to grant access to the vehicle further comprises;
determining whether to authenticate a user associated with the detected access device or request to access the vehicle based on the retrieved security profile,in response to determining to authenticate the user, performing an authentication process indicated by the retrieved security profile, anddetermining whether to grant access to the vehicle based on a result of performing the authentication process; and
in response to determining to grant access to the vehicle, granting, by the security system controller, access to the vehicle according to an access level for the detected access device or the request to access the vehicle, wherein the access level is identified in the retrieved security profile and is selected from a plurality of different access levels.
5 Assignments
0 Petitions
Accused Products
Abstract
Embodiments are directed to employing various methods and devices to access a vehicle and controlling a level of access granted based on the device and methods employed. Controlling access to a vehicle can comprise maintaining a plurality of security profiles, each security profile associated with a different access device or type of access device. When the presence of an access device in proximity to the vehicle or a request to access the vehicle is detected, a security profile associated with the detected access device or the request to access the vehicle can be retrieved and used to determine whether to grant access to the vehicle. In response to determining to grant access to the vehicle, access to the vehicle can be provided according to an access level for the detected access device or the request to access the vehicle identified in the retrieved security profile.
942 Citations
17 Claims
-
1. A method for controlling access to a vehicle, the method comprising:
-
maintaining, by a security system controller of the vehicle, a plurality of security profiles, each security profile associated with a different access device or type of access device; detecting, by the security system controller through a wireless communications interface, presence of an access device in proximity to the vehicle or a request to access the vehicle; retrieving, by the security system controller from the plurality of security profiles, a security profile associated with the detected access device or the request to access the vehicle; determining, by the security system controller, whether to grant access to the vehicle based on the detected access device or the request to access the vehicle and the retrieved security profile, wherein determining whether to grant access to the vehicle further comprises; determining whether to authenticate a user associated with the detected access device or request to access the vehicle based on the retrieved security profile, in response to determining to authenticate the user, performing an authentication process indicated by the retrieved security profile, and determining whether to grant access to the vehicle based on a result of performing the authentication process; and in response to determining to grant access to the vehicle, granting, by the security system controller, access to the vehicle according to an access level for the detected access device or the request to access the vehicle, wherein the access level is identified in the retrieved security profile and is selected from a plurality of different access levels. - View Dependent Claims (2, 3, 4, 5, 6)
-
-
7. A security system of a vehicle, the security system comprising:
-
a processor; and a memory coupled with and readable by the processor and storing therein a set of instructions which, when executed by the processor, causes the processor to control access to the vehicle by; maintaining a plurality of security profiles, each security profile associated with a different access device or type of access device; detecting, through a wireless communications interface, the presence of an access device in proximity to the vehicle or a request to access the vehicle; retrieving, from the plurality of security profiles, a security profile associated with the detected access device or the request to access the vehicle; determining whether to grant access to the vehicle based on the detected access device or the request to access the vehicle and the retrieved security profile, wherein determining whether to grant access to the vehicle further comprises; determining whether to authenticate a user associated with the detected access device or request to access the vehicle based on the retrieved security profile, in response to determining to authenticate the user, performing an authentication process indicated by the retrieved security profile, and determining whether to grant access to the vehicle based on a result of performing the authentication process; and in response to determining to grant access to the vehicle, granting access to the vehicle according to an access level for the detected access device or the request to access the vehicle, wherein the access level is identified in the retrieved security profile and is selected from a plurality of different access levels. - View Dependent Claims (8, 9, 10, 11, 12)
-
-
13. A vehicle comprising:
-
a wireless communications interface; a plurality of sub-systems of the vehicle; and a security system controlling access to the vehicle by; maintaining a plurality of security profiles, each security profile associated with a different access device or type of access device; detecting, through the wireless communications interface, a presence of an access device in proximity to the vehicle or a request to access the vehicle; retrieving, from the plurality of security profiles, a security profile associated with the detected access device or the request to access the vehicle; determining whether to grant access to the vehicle based on the detected access device or the request to access the vehicle and the retrieved security profile, wherein determining whether to grant access to the vehicle further comprises; determining whether to authenticate a user associated with the detected access device or request to access the vehicle based on the retrieved security profile, in response to determining to authenticate the user, performing an authentication process indicated by the retrieved security profile, and determining whether to grant access to the vehicle based on a result of performing the authentication process; and in response to determining to grant access the vehicle, granting access to one or more sub-systems of the plurality of sub-systems of the vehicle according to an access level for the detected access device or the request to access the vehicle, wherein the access level is identified in the retrieved security profile and is selected from a plurality of different access levels. - View Dependent Claims (14, 15, 16, 17)
-
Specification