Patent application number | Description | Published |
20090323967 | PRODUCTION OF CRYPTOGRAPHIC KEYS FOR AN EMBEDDED PROCESSING DEVICE - A system and method for producing cryptographic keys for use by an embedded processing device within a manufactured product. A pseudo random number generator is seeded with entropy data gathered by the embedded device, and the result is used to generate a public-private key pair. The process can be carried out during manufacturing so that the public key of each manufactured product can be stored in a database along with a unique identifier for the embedded device associated with the key. In one particular example, a vehicle having an installed telematics unit uses the key generating process to self-generate keys using entropy data available to the vehicle. | 12-31-2009 |
20100202616 | METHOD OF SECURING AND AUTHENTICATING DATA USING MICRO-CERTIFICATES - A method of securing wireless communications includes storing a recipient's micro-certificate at a vehicle, a call center, or a certificate authority, transmitting the micro-certificate from its place of storage, extracting the public key from the micro-certificate, encrypting the vehicle communication using the public key, transmitting the encrypted vehicle communication to the recipient, and decrypting the vehicle communication using a private key after receiving the vehicle communication. The micro-certificate can include identifying data for the recipient and can have a length that is less than twice the length of the public key contained in the micro-certificate. | 08-12-2010 |
20110145925 | SECURE PROGRAMMING OF VEHICLE MODULES - A method for programming a vehicle module via a secure programming system. The method carried out by the system involves generating a credentials media containing one or more secure credentials. Then, a credentials programmer programs one or more vehicle modules using the credentials media. During each stage of the vehicle module programming, the programming status is securely updated in the credential media. In case of a programming failure, the credentials media is used in a secondary credentials programmer to program the vehicle modules. | 06-16-2011 |
20110260884 | METHOD FOR COLLECTING DATA AND SYSTEM FOR ACCOMPLISHING THE SAME - A method for collecting data is disclosed herein. The method involves selecting, via a processor associated with a telematics service center, a mobile vehicle to collect data from a sensor configured to wirelessly communicate with one or more selected vehicles and, via a telematics unit disposed in the selected mobile vehicle, receiving data collected by the sensor. The method further involves, via the telematics unit, transmitting the data from the telematics unit to a data aggregator and reporting the data from the data aggregator to a facility. Also disclosed herein is a system for accomplishing the same. | 10-27-2011 |
20120028656 | METHOD OF IDENTIFYING TELEMATICS CALLS - A method of identifying telematics calls includes the steps of receiving at a vehicle telematics unit a paging message used to connect a call over a wireless carrier system; determining at the vehicle telematics unit if the paging message used to connect the call includes a Mobile Identification Number (MIN) or a Mobile Equipment Identifier (MEID); and establishing the call and, if the vehicle telematics unit determines that the paging message includes the MEID, entering into a mode in which the vehicle telematics unit uses a modem for receipt and transmission of data | 02-02-2012 |
20120295592 | Vehicle Component Identification and Configuration Registry Reporting System - A method and system for utilizing a telematics unit on a telematics-equipped vehicle as a register for ECU Critical Information (ECI) associated with the ECUs in the vehicle, which may include their serial numbers, configurations, software images, and other data includes the telematics unit querying ECUs within the telematics-equipped vehicle such as, for example, when the vehicle is started. The ECUs may then provide the telematics unit with the ECI associated with each ECU. The ECI may be encrypted, and the telematics unit may provide each module that it queries with a nonce used in the encryption process. The telematics unit may then decrypt the ECI received from each of the ECUs and compare the received ECI to previously stored ECI. If the received ECI is different from the previously stored ECI, the telematics unit may send the new ECI to a TSP call center. Both the telematics unit and the call center may replace the previously stored ECI with the new ECI and may maintain records of previously stored ECI and updates to the ECI. | 11-22-2012 |
20120302202 | VEHICLE DATA MANAGEMENT SYSTEM AND METHOD - A system and method of for establishing a connection between a vehicle and an external network includes a plurality of personal electronic devices and a transceiver. The plurality of personal electronic devices are each configured for establishing a data connection to the vehicle. Each of the plurality of personal electronic have a mobile plan that includes a data limit and an amount of data used. At least one of the plurality of personal electronic devices are selected to be in communication with the external network. Selection of at least one of the plurality of personal electronic devices is based on a corresponding amount of data available in a mobile plan for each of the personal electronic devices. | 11-29-2012 |
20120302265 | VEHICLE TELEMATICS COMMUNICATION FOR PROVIDING VEHICLE TELEMATICS SERVICES - A method and system for providing a communication message to a vehicle occupant using a vehicle telematics unit. The method carried out by the system involves receiving a broadcasted message having a plurality of different codes at a vehicle telematics unit, generating a text message by converting at least some of the codes into one or more words, and concatenating the words together to form the text message. The method further involves presenting the text message to an occupant of the vehicle. | 11-29-2012 |
20130090782 | METHOD OF COMMUNICATING WITH A VEHICLE HAVING A TELEMATICS UNIT - A system and method for communicating between a vehicle having a vehicle telematics unit and a central facility includes establishing a virtual private network (VPN) connection between a vehicle and a central facility; constructing a data message for communication between the vehicle and the central facility using the VPN; transmitting the data message via the VPN using an unreliable transmission protocol; and determining if the transmitted data message arrived at its destination. | 04-11-2013 |
20130130665 | METHOD OF INITIATING A HANDS-FREE CONFERENCE CALL - A method of operating a vehicle telematics unit includes storing a conference call access code; initiating a conference call from a vehicle based on verbal commands received from a vehicle occupant; receiving a request for the conference call access code from an automated telephone attendant (ATA) while initiating the conference call; determining that the ATA has requested the conference call access code using a speech recognition function at the vehicle; and sending the stored conference call access code to the ATA based on the determination of the speech recognition function. | 05-23-2013 |
20130149998 | AUTHENTICATING MESSAGES SENT BETWEEN A VEHICLE AND A CENTRAL FACILITY - A system and method for transmitting short message service (SMS) messages between a vehicle and a central facility includes determining an authentication tone having a unique characteristic, generating an SMS message that includes computer-readable data representing the authentication tone; sending the SMS message to a central facility, establishing a call between the central facility and the vehicle using a vehicle telematics unit and a wireless carrier system, generating the determined authentication tone at the vehicle, and transmitting the generated authentication tone over the established call to the central facility. | 06-13-2013 |
20130231052 | METHOD OF ESTABLISHING COMMUNICATION BETWEEN DEVICES IN A VEHICLE - A method and system for establishing secure short range wireless communication between devices in a vehicle. The method involves obtaining a vehicle identifier associated with the vehicle and a module identifier associated with a vehicle module. Then, the method determines a secure pin number for the vehicle module and a similar pin for a vehicle telematics unit. Once the secure pin number is determined at both devices then the devices can communicate via short range wireless communication in a secure manner using the secure pin number. | 09-05-2013 |
20130310010 | METHOD OF COMMUNICATING BETWEEN A VEHICLE AND A TELEMATICS SUBSCRIPTION SERVICE - A method of communicating between a vehicle and a telematics subscription service includes initiating a call from a vehicle telematics unit to a telematics subscription service via a wireless carrier system; accessing a vertical service code telephone number that is associated with the telematics subscription service and stored at a vehicle carrying the vehicle telematics unit; establishing a call between the vehicle telematics unit and the telematics subscription service using the accessed vertical service code telephone number; and wirelessly transmitting vehicle-related data between the vehicle telematics unit and the telematics subscription service over the established call. | 11-21-2013 |
20130337801 | METHOD OF COMMUNICATING BETWEEN A VEHICLE AND A TELEMATICS SUBSCRIPTION SERVICE - A method of communicating between a vehicle and a telematics subscription service includes wirelessly linking a vehicle telematics unit to a session initiation protocol (SIP) proxy server; placing a telephone call from the vehicle telematics unit that is received by the SIP proxy server via the wireless link; establishing a SIP connection between the vehicle telematics unit and a telematics subscription service using the SIP proxy server in response to the placed telephone call; and communicating packetized data between the vehicle telematics unit and the telematics subscription service via the SIP connection. | 12-19-2013 |
20140032800 | VEHICLE MESSAGE FILTER - A message filtering system for a communications system in a vehicle enabling communication between various systems and subsystems via a vehicle bus. Electronic devices may be coupled to the bus. Electronic control units (ECUs) may be located therebetween. The ECU may regulate or control the flow of messages between the bus and the electronic devices. Message filters may apply a filter policy to incoming and outgoing messages. In addition, the message filtering system may have an alert policy for violations of the filter policy. In one embodiment, the source identity of outgoing messages may be overwritten by a message filter dedicated to outgoing messages; this message filter may be an application specific integrated circuit. | 01-30-2014 |
20140075198 | FULLY AUTHENTICATED CONTENT TRANSMISSION FROM A PROVIDER TO A RECIPIENT DEVICE VIA AN INTERMEDIARY DEVICE - A method, system, and computer readable medium containing programming for handling fully authenticated transmission of video or other data (content) from a provider to a recipient device via an intermediary device. An inner envelope containing the content and/or security features is prepared and digitally signed using a private cryptographic key. The signed inner envelope is then included in a second, outer envelope which may also include some or all of the content. The outer envelope is also digitally signed, thereby forming a data package which may be sent from the provider to the intermediary device. If the signature of the outer envelope is authenticated at the intermediary device, then the inner envelope is sent to the recipient device which then uses the inner signature to verify its authenticity. Authenticated content may then be presented or otherwise used at the recipient device. | 03-13-2014 |
20140169564 | METHOD AND SYSTEM FOR SECURE AND AUTHORIZED COMMUNICATION BETWEEN A VEHICLE AND WIRELESS COMMUNICATION DEVICES OR KEY FOBS - A system is provided that includes a wireless communication device (or end device), a vehicle having a central module, and a key provisioning server. The key provisioning server is communicatively coupled to the wireless communication device and the central module via wireless connections. The central module can establish a wireless connection with the wireless communication device to initiate a current communication session. When the wireless connection is established with the central module, the wireless communication device communicates a request message to request temporary security information (e.g., public key and/or a digital certificate). The key provisioning server can then provide, in response to the request message, the temporary security information to the wireless communication device and/or the central module. The temporary security information can then be used to encrypt communications between the wireless communication device and the central module. | 06-19-2014 |
20140213216 | METHODS AND SYSTEMS FOR BASE STATION DETECTION - Methods and systems for unauthorized base station detection are disclosed herein. In an example of the method, an in-vehicle controller of a vehicle or an application of a mobile communications device scans a cellular radio environment to identify an available base station. By a signal detection unit in operative communication with the in-vehicle controller or the application, a strength of a signal of the available base station is detected. The in-vehicle controller or the application recognizes that the signal strength is out of the expected signal strength range, and determines that the available base station is the unauthorized base station. While in connection with the unauthorized base station, the in-vehicle controller or the application determines a location of the unauthorized base station. Other examples of the method are also disclosed herein. | 07-31-2014 |
20140270158 | CONNECTION KEY DISTRIBUTION - A system and a method implementing the method pertaining to securely providing a mobile device with a cryptographic key in a vehicle. The method includes generating a cryptographic key pair. The key pair may include at least a first cryptographic key and a second cryptographic key. The method may further include creating a label using a scannable image readable by a mobile device; the scannable image may be based on the second cryptographic key. And the method may include providing the label to the vehicle for displaying the scannable image. | 09-18-2014 |
20140270172 | SECURING A COMMAND PATH BETWEEN A VEHICLE AND PERSONAL WIRELESS DEVICE - A system and a method using that system is provided for establishing a secure communication channel between a vehicle and a mobile device. The method may include providing at least one unique mobile device identifier and at least one unique vehicle telematics unit identifier associated with the mobile device identifier to a call center. At least one of the two identifiers may be provided to a wireless service provider. Two private keys may be generated—a first private key based on the at least one unique mobile identifier and a second private key based on the at least one unique vehicle telematics unit identifier. The first private key may be provided to the mobile device within a first cryptographic envelope signed with a first cryptographic key. And the second private key may be provided to the vehicle telematics unit within a second cryptographic envelope signed with a second cryptographic key. | 09-18-2014 |
20150019068 | Vehicle Component Identification And Configuration Registry Reporting System - A method and system for utilizing a telematics unit on a telematics-equipped vehicle as a register for ECU Critical Information (ECI) associated with the ECUs in the vehicle, which may include their serial numbers, configurations, software images, and other data includes the telematics unit querying ECUs within the telematics-equipped vehicle such as, for example, when the vehicle is started. The ECUs may then provide the telematics unit with the ECI associated with each ECU. The ECI may be encrypted, and the telematics unit may provide each module that it queries with a nonce used in the encryption process. The telematics unit may then decrypt the ECI received from each of the ECUs and compare the received ECI to previously stored ECI. If the received ECI is different from the previously stored ECI, the telematics unit may send the new ECI to a TSP call center. Both the telematics unit and the call center may replace the previously stored ECI with the new ECI and may maintain records of previously stored ECI and updates to the ECI. | 01-15-2015 |