×

Approach for securing a vehicle access port

  • US 10,728,249 B2
  • Filed: 03/24/2017
  • Issued: 07/28/2020
  • Est. Priority Date: 04/26/2016
  • Status: Active Grant
First Claim
Patent Images

1. A mechanism for controlling signals between a vehicle and an entity outside of the vehicle, comprising:

  • a vehicle having one or more electronic control units (ECUs);

    a vehicle bus connected to the one or more ECUs;

    a security module connected to the vehicle bus; and

    a vehicle access port connected to the security module; and

    wherein;

    the security module passes, controls, restricts or blocks signals between the vehicle access port and the vehicle bus according to a vehicle manufacturer security policy;

    the vehicle is a product of a vehicle manufacturer;

    the vehicle manufacturer security policy applies to an accessing entity having a wireless or non-wireless connection with the vehicle access port;

    the vehicle manufacturer creates a vehicle manufacturer public key and a vehicle manufacturer private key;

    the vehicle manufacturer private key is protected in the security module;

    an accessing entity provider creates an accessing entity provider public key and an accessing entity provider private key;

    the accessing entity provider sends the accessing entity provider public key and an accessing entity provider identification data to the vehicle manufacturer using a certificate request protocol;

    the vehicle manufacturer uses the vehicle manufacturer private key to sign an accessing entity provider certificate, wherein the accessing entity provider certificate includes the accessing entity provider identification data and the accessing entity provider public key;

    the vehicle manufacturer creates a policy change authorization token having changes to the vehicle manufacturer security policy;

    the vehicle manufacturer signs the policy change authorization token with the vehicle manufacturer private key;

    the vehicle manufacturer sends the policy change authorization token to the accessing entity provider;

    an accessing entity public key and an accessing entity private key are created by the accessing entity provider for the accessing entity;

    the accessing entity provider uses the accessing entity provider private key to sign an accessing entity certificate containing the accessing entity identification data and the accessing entity public key; and

    the accessing entity provider loads a copy of the accessing entity provider certificate, the accessing entity certificate, and the policy change authorization token into the accessing entity.

View all claims
  • 8 Assignments
Timeline View
Assignment View
    ×
    ×