Methods and systems for implementing and enforcing security and resource policies for a vehicle
원문보기
IPC분류정보
국가/구분
United States(US) Patent
등록
국제특허분류(IPC7판)
G06F-021/44
G06F-021/30
G06F-021/55
출원번호
US-0788797
(2010-05-27)
등록번호
US-9639688
(2017-05-02)
발명자
/ 주소
Westra, Michael Raymond
Waraich, Sandeep Singh
Wadhwa, Sukhwinder
Schanerberger, Michael J.
Johnson, Jason Bernard
Marchwicki, Julius
출원인 / 주소
Ford Global Technologies, LLC
대리인 / 주소
Stec, Jennifer
인용정보
피인용 횟수 :
1인용 특허 :
71
초록▼
In one or more embodiments, a vehicle resource usage control system includes a vehicle computer having security policies that define usage rules for one or more vehicle resources. One or more devices communicating with the vehicle computer may have installed in memory software applications that use
In one or more embodiments, a vehicle resource usage control system includes a vehicle computer having security policies that define usage rules for one or more vehicle resources. One or more devices communicating with the vehicle computer may have installed in memory software applications that use one or more vehicle resources for operation. Programmed instructions may be received that define which of the one or more vehicle resources the software applications use for operation. These programmed instructions may be associated with the one or more security policies. The security policy associated with the software applications may be determined based on the programmed instructions. Operation of the software applications may be permitted according to the security policy.
대표청구항▼
1. A system comprising: a vehicle-based processor, having access to stored security policies relating to vehicle resource usage, and configured to:receive a resource access request from a remote application stored on a wirelessly connected device, including a list of all resources utilized by the ap
1. A system comprising: a vehicle-based processor, having access to stored security policies relating to vehicle resource usage, and configured to:receive a resource access request from a remote application stored on a wirelessly connected device, including a list of all resources utilized by the application;examine security requirements for each of the resources; andset access rights for the application to use resources for which the security policy coincides with security rights of the application. 2. The system of claim 1, wherein the application has generalized security rights, and wherein a first coincidental security policy to the generalized rights permits access to a first level of vehicle resources. 3. The system of claim 2, wherein the first level of vehicle resources includes vehicle infotainment inputs and outputs. 4. The system of claim 1, wherein the application has specific security rights, and wherein a second coincidental security policy to the specific securityrights permits access to a second level of vehicle resources. 5. The system of claim 4, wherein the specific security rights are established by a security policy's specific reference to the application. 6. The system of claim 5, wherein the specific security rights vary from application to application, among applications having specific security rights, such that varied applications have access to different resources of the second level of vehicle resources. 7. The system of claim 1, wherein the processor is further configured to control resource usage, such that applications native to a vehicle computing system have priority in resource usage over remote applications. 8. The system of claim 7, wherein all native applications have priority over all remote applications. 9. The system of claim 7, wherein all native applications have priority over remote applications whose usage rights are provided under a generalized security policy. 10. A computer-implemented method comprising: accessing stored security policies relating to vehicle resource usage;receiving a resource access request from a remote application stored on a wirelessly connected device, including a list of all resources utilized by the application;examining security requirements for each of the resources; andsetting, via a vehicle computer, access rights for the application to use resources for which the security policy coincides with security rights of the application. 11. The method of claim 10, wherein the application has generalized security rights, and wherein a coincidental security policy to the generalized rights permits access to a first level of vehicle resources. 12. The method of claim 11, wherein the first level of vehicle resources includes vehicle infotainment inputs and outputs. 13. The method of claim 10, wherein the application has specific security rights, and wherein a coincidental security policy to the specific security rights permits access to a second level of vehicle resources. 14. The method of claim 13, wherein the specific security rights are established by a security policy's specific reference to the application. 15. The method of claim 14, wherein the specific security rights vary from application to application, among applications having specific security rights, such that varied applications have access to different resources of the second level of vehicle resources. 16. The method of claim 10, further comprising controlling resource usage, such that applications native to a vehicle computing system have priority in resource usage over remote applications. 17. The method of claim 16, wherein all native applications have priority over all remote applications. 18. The method of claim 16, wherein all native applications have priority over remote applications whose usage rights are provided under a generalized security policy. 19. A non-transitory computer readable storage medium storing instructions that, when executed by a processor, cause the processor to perform the method including: accessing stored security policies relating to vehicle resource usage;receiving a resource access request from a remote application stored on a wirelessly connected device, including a list of all resources utilized by the application;examining security requirements for each of the resources; andsetting, via a vehicle computer, access rights for the application to use resources for which the security policy coincides with security rights of the application.
연구과제 타임라인
LOADING...
LOADING...
LOADING...
LOADING...
LOADING...
이 특허에 인용된 특허 (71)
Guba,George A, Apparatus and method for a valet key based passive security system.
Ashihara, Jun, Driver authentication apparatus and method for identifying automatically-extracted driver's operation feature data with already-registered feature data.
Altan, Osman D.; Kiefer, Raymond J.; Chundrlik, Jr., William J.; Labuhn, Pamela I., Method and system for vehicle impact assessment using driver braking estimation.
Knott,Benjamin Anthony; Martin,John Mills; Bushey,Robert Randal; Smart,Tracy Leigh, Method and system for voice recognition menu navigation with error prevention and recovery.
Dauner, Oskar; Foerster, Robert; Goebel, Fridjof; Hoess, Konrad; Schneider, Jutta; Schneider, Sandra, Motor vehicle communication system and method for exchanging data in a motor vehicle.
Tonkin Mark Christopher,GB3 ; Hall Simon Lewis Marshall,GB3 ; Strong Gareth Anthony,GB3 ; Cucinotta Marco,GB3, Motor vehicle display system and ranging device.
Trepagnier, Paul Gerard; Nagel, Jorge Emilio; Kinney, Powell McVay; Dooner, Matthew Taylor; Wilson, Bruce Mackie; Schneider, Jr., Carl Reimers; Goeller, Keith Brian, Navigation and control system for autonomous vehicles.
Miller, Thomas Lee; Bennie, Brian; Sarkisian, Andrew D.; Dalebout, Matthew J.; Cepuran, Lawrence Daniel; Cooprider, Anthony Dwayne; Brombach, Ronald Patrick; Hille, Kevin Thomas; Wojcik, Karl William; Van Wiemeersch, John Robert; Cwik, Terry Thomas; Watkins, Scott Alan; Bhuva, Shimul; Mills, Aaron Lewis, System and method for controlling one or more vehicle features based on driver status.
Miller, Thomas Lee; Bennie, Brian; Watkins, Scott Alan; Gusta, Michael L.; Reed, Eric L., System and method for programming keys to vehicle to establish primary and secondary drivers.
Bonnell David N. (Houston TX) Tatarinov Kirill L. (Bellaire TX) Picard Martin W. (Bellaire TX), System for monitoring and managing computer resources and applications across a distributed computing environment using.
Harter, Jr., Joseph E.; Scharenbroch, Gregory K.; Fultz, William W.; Griffin, Dennis P.; Witt, Gerald J., User discrimination control of vehicle infotainment system.
Sadler, John G.; Madau, Adrian; Gioia, Thomas A.; Heussner, Eric M.; Chi, David D.; Templeton, Ryan L., Vehicle personalization via biometric identification.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.