Methods and systems for implementing and enforcing security and resource policies for a vehicle
First Claim
1. A system comprising:
- a vehicle-based processor, having access to stored security policies relating to vehicle resource usage, and configured to;
receive a resource access request from a remote application stored on a wirelessly connected device, including a list of all resources utilized by the application;
examine security requirements for each of the resources; and
set access rights for the application to use resources for which the security policy coincides with security rights of the application.
1 Assignment
0 Petitions
Accused Products
Abstract
In one or more embodiments, a vehicle resource usage control system includes a vehicle computer having security policies that define usage rules for one or more vehicle resources. One or more devices communicating with the vehicle computer may have installed in memory software applications that use one or more vehicle resources for operation. Programmed instructions may be received that define which of the one or more vehicle resources the software applications use for operation. These programmed instructions may be associated with the one or more security policies. The security policy associated with the software applications may be determined based on the programmed instructions. Operation of the software applications may be permitted according to the security policy.
165 Citations
19 Claims
-
1. A system comprising:
-
a vehicle-based processor, having access to stored security policies relating to vehicle resource usage, and configured to; receive a resource access request from a remote application stored on a wirelessly connected device, including a list of all resources utilized by the application; examine security requirements for each of the resources; and set access rights for the application to use resources for which the security policy coincides with security rights of the application. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
-
10. A computer-implemented method comprising:
-
accessing stored security policies relating to vehicle resource usage; receiving a resource access request from a remote application stored on a wirelessly connected device, including a list of all resources utilized by the application; examining security requirements for each of the resources; and setting, via a vehicle computer, access rights for the application to use resources for which the security policy coincides with security rights of the application. - View Dependent Claims (11, 12, 13, 14, 15, 16, 17, 18)
-
-
19. A non-transitory computer readable storage medium storing instructions that, when executed by a processor, cause the processor to perform the method including:
-
accessing stored security policies relating to vehicle resource usage; receiving a resource access request from a remote application stored on a wirelessly connected device, including a list of all resources utilized by the application; examining security requirements for each of the resources; and setting, via a vehicle computer, access rights for the application to use resources for which the security policy coincides with security rights of the application.
-
Specification