Log in
E-mail
Password
Remember
Forgot password ?
Become a member for free
Sign up
Sign up
Settings
Settings
Dynamic quotes 
OFFON

MarketScreener Homepage  >  Equities  >  Nyse  >  International Business Machines Corporation    IBM

INTERNATIONAL BUSINESS MACHINES CORPORAT

(IBM)
  Report  
SummaryQuotesChartsNewsRatingsCalendarCompanyFinancialsConsensusRevisions 
News SummaryMost relevantAll newsOfficial PublicationsSector newsAnalyst Recommendations

Patent Issued for Vehicle Wireless Internet Security (USPTO 10,367,795): International Business Machines Corporation

share with twitter share with LinkedIn share with facebook
share via e-mail
0
08/14/2019 | 05:42pm EDT

2019 AUG 14 (NewsRx) -- By a News Reporter-Staff News Editor at Internet Daily News -- International Business Machines Corporation (Armonk, New York, United States) has been issued patent number 10,367,795, according to news reporting originating out of Alexandria, Virginia, by NewsRx editors.

The patent’s inventors are Reece, Stuart J. (Winchester, GB); Shaw, Matthew S. (Chandler’s Ford, GB).

This patent was filed on August 6, 2018 and was published online on August 12, 2019.

From the background information supplied by the inventors, news correspondents obtained the following quote: “The present invention relates generally to the field of wireless network security, and more particularly to vehicle wireless network security enhancements.

“Wireless networks are used to link two or more devices using a wireless communication method within a limited area. Wireless networks give users the ability to move around within a local coverage area and still be connected to the network. Often, wireless network access points are provided by a router. The router can require a user to input a security key to access the network.

“Access points to wireless networks are increasing. For example, some motor vehicles are equipped with infrastructure to provide wireless network access. Wireless network access within a motor vehicle can be used by passengers to access the network on a mobile device. Further, wireless network access can be used to expand the vehicles amenities. For example, network access can be used to stream music over a stereo.”

Supplementing the background information on this patent, NewsRx reporters also obtained the inventors’ summary information for this patent: “According to one embodiment of the present invention, a method for securing wireless internet in a vehicle is provided. The method includes receiving a connection request from a mobile device; transmitting a data request to the mobile device, wherein the data request comprises a request for location-based data of the mobile device; receiving a first data from the mobile device, wherein the first data corresponds to the data request; generating a vehicle data, wherein the vehicle data comprises location-based data of the vehicle; and determining whether the first data matches the vehicle data, wherein a match is determined where the location-based data of the mobile device is within a pre-determined threshold of the location-based data of the vehicle.

“According to another embodiment of the present invention, a computer program product for securing wireless internet in a vehicle is provided. The computer program product comprises a computer readable storage medium and program instructions stored on the computer readable storage medium. The program instructions include program instructions to receive a connection request from a mobile device; program instructions to transmit a data request to the mobile device, wherein the data request comprises a request for location-based data of the mobile device; program instructions to receive a first data from the mobile device, wherein the first data corresponds to the data request; program instructions to generate a vehicle data, wherein the vehicle data comprises location-based data of the vehicle; and program instructions to determine whether the first data matches the vehicle data, wherein a match is determined where the location-based data of the mobile device is within a pre-determined threshold of the location-based data of the vehicle.

“According to another embodiment of the present invention, a computer system for securing wireless internet in a vehicle is provided. The computer system includes one or more computer processors, one or more computer readable storage media, and program instructions stored on the computer readable storage media for execution by at least one of the one or more processors. The program instructions include program instructions to receive a connection request from a mobile device; program instructions to transmit a data request to the mobile device, wherein the data request comprises a request for location-based data of the mobile device; program instructions to receive a first data from the mobile device, wherein the first data corresponds to the data request; program instructions to generate a vehicle data, wherein the vehicle data comprises location-based data of the vehicle; and program instructions to determine whether the first data matches the vehicle data, wherein a match is determined where the location-based data of the mobile device is within a pre-determined threshold of the location-based data of the vehicle.”

The claims supplied by the inventors are:

“What is claimed is:

“1. A method comprising: receiving, by one or more processors, a connection request from a mobile device; transmitting, by one or more processors, a data request to the mobile device, wherein the data request comprises a request for location-based data of the mobile device; receiving, by one or more processors, a first data from the mobile device, wherein the first data corresponds to the data request; generating, by one or more processors, a vehicle data, wherein the vehicle data comprises location-based data of the vehicle; determining, by one or more processors, whether the first data matches the vehicle data, wherein a match is determined where the location-based data of the mobile device is within a pre-determined threshold of the location-based data of the vehicle; and re-authenticating, by one or more processors, the mobile device, by: transmitting, by one or more processors, a second data request from the mobile device, wherein the second data request comprises a request for an updated velocity of the mobile device; receiving, by one or more processors, a second data from the mobile device, wherein the second data corresponds to the second data request; re-generating, by one or more processors, the vehicle data, including generating an updated velocity of the vehicle; and determining, by one or more processors, whether the second data matches the vehicle data based, at least in part, on the updated velocity of the mobile device and updated velocity of the vehicle.

“2. The method of claim 1, further comprising: in response to determining that the vehicle data does not match the first data, prompting, by one or more processors, the mobile device for a security key; receiving, by one or more processors, a first security key from the mobile device; and determining, by one or more processors, whether the first security key matches an expected response.

“3. The method of claim 2, further comprising: in response to determining that the first security key matches the expected response, allowing, by one or more processors, the mobile device to connect to a network.

“4. The method of claim 2, further comprising: in response to determining that the first security key does not match the expected response, blocking, by one or more processors, access of the mobile device to a network.

“5. The method of claim 1, wherein re-authenticating the mobile device is in response to determining that an acceleration of the vehicle is not equal to zero.

“6. A computer program product, the computer program product comprising: a computer readable storage medium and program instructions stored on the computer readable storage medium, the program instructions comprising: program instructions to receive a connection request from a mobile device; program instructions to transmit a data request to the mobile device, wherein the data request comprises a request for location-based data of the mobile device; program instructions to receive a first data from the mobile device, wherein the first data corresponds to the data request; program instructions to generate a vehicle data, wherein the vehicle data comprises location-based data of the vehicle; program instructions to determine whether the first data matches the vehicle data, wherein a match is determined where the location-based data of the mobile device is within a pre-determined threshold of the location-based data of the vehicle; and program instructions to re-authenticate the mobile device, by: program instructions to transmit a second data request from the mobile device, wherein the second data request comprises a request for an updated velocity of the mobile device; program instructions to receive a second data from the mobile device, wherein the second data corresponds to the second data request; program instructions to re-generate the vehicle data, including generating an updated velocity of the vehicle; and program instructions to determine whether the second data matches the vehicle data based, at least in part, on the updated velocity of the mobile device and updated velocity of the vehicle.

“7. The computer program product of claim 6, further comprising; in response to determining that the vehicle data does not match the first data, program instructions to prompt the mobile device for a security key; program instructions to receive a first security key from the mobile device; and program instructions to determine whether the first security key matches an expected response.

“8. The computer program product of claim 7, further comprising: in response to determining that the first security key matches the expected response, program instructions to allow the mobile device to connect to a network.

“9. The computer program product of claim 6, wherein re-authenticating the mobile device is in response to determining that an acceleration of the vehicle is not equal to zero.

“10. A computer system, the computer system comprising: one or more computer processors; one or more computer readable storage media; program instructions stored on the computer readable storage media for execution by at least one of the one or more processors, the program instructions comprising: program instructions to receive a connection request from a mobile device; program instructions to transmit a data request to the mobile device, wherein the data request comprises a request for location-based data of the mobile device; program instructions to receive a first data from the mobile device, wherein the first data corresponds to the data request; program instructions to generate a vehicle data, wherein the vehicle data comprises location-based data of the vehicle; program instructions to determine whether the first data matches the vehicle data, wherein a match is determined where the location-based data of the mobile device is within a pre-determined threshold of the location-based data of the vehicle; and program instructions to re-authenticate the mobile device, by: program instructions to transmit a second data request from the mobile device, wherein the second data request comprises a request for an updated velocity of the mobile device; program instructions to receive a second data from the mobile device, wherein the second data corresponds to the second data request; program instructions to re-generate the vehicle data, including generating an updated velocity of the vehicle; and program instructions to determine whether the second data matches the vehicle data based, at least in part, on the updated velocity of the mobile device and updated velocity of the vehicle.

“11. The computer system of claim 10, further comprising; in response to determining that the vehicle data does not match the first data, program instructions to prompt the mobile device for a security key; program instructions to receive a first security key from the mobile device; and program instructions to determine whether the first security key matches an expected response.

“12. The computer system of claim 11, further comprising: in response to determining that the first security key matches the expected response, program instructions to allow the mobile device to connect to a network.

“13. The computer system of claim 10, wherein re-authenticating the mobile device is in response to determining that an acceleration of the vehicle is not equal to zero.”

For the URL and additional information on this patent, see: Reece, Stuart J.; Shaw, Matthew S. Vehicle Wireless Internet Security. U.S. Patent Number 10,367,795, filed August 6, 2018, and published online on August 12, 2019. Patent URL: http://patft.uspto.gov/netacgi/nph-Parser?Sect1=PTO1&Sect2=HITOFF&d=PALL&p=1&u=%2Fnetahtml%2FPTO%2Fsrchnum.htm&r=1&f=G&l=50&s1=10,367,795.PN.&OS=PN/10,367,795RS=PN/10,367,795

(Our reports deliver fact-based news of research and discoveries from around the world.)

Copyright © 2019 NewsRx LLC, Internet Daily News, source Technology Newsletters

share with twitter share with LinkedIn share with facebook
share via e-mail
0
Latest news on INTERNATIONAL BUSINESS MAC
09:59aINTERNATIONAL BUSINESS MACHINES : IHL Group Names IBM Order Management as a Lead..
PR
08/16INTERNATIONAL BUSINESS MACHINES : IBM looking for more opportunities for transfo..
AQ
08/152022 Business Analytics & Enterprise Software Market Growth, Forecasts and Ke..
AQ
08/14INTERNATIONAL BUSINESS MACHINES : IBM looking for more opportunities for transfo..
AQ
08/14Stocks: Dividends in Spotlight as Bond Yields Drop -- WSJ
DJ
08/12INTERNATIONAL BUSINESS MACHINES : IBM files patent for blockchain web browser
AQ
08/12INTERNATIONAL BUSINESS MACHINES : Frost and Sullivan-Automated Software Testing ..
AQ
08/08INTERNATIONAL BUSINESS MACHINES : ISM Canada Appoints Hasnain Versi as New Presi..
AQ
08/08INTERNATIONAL BUSINESS MACHINES CORP : Ex-dividend day for
FA
08/07NEWS HIGHLIGHTS : Top Company News of the Day
DJ
More news
Financials (USD)
Sales 2019 77 842 M
EBIT 2019 12 712 M
Net income 2019 10 433 M
Debt 2019 39 695 M
Yield 2019 4,75%
P/E ratio 2019 11,7x
P/E ratio 2020 10,9x
EV / Sales2019 2,05x
EV / Sales2020 1,89x
Capitalization 120 B
Chart INTERNATIONAL BUSINESS MACHINES CORPORATION
Duration : Period :
International Business Machines Corporation Technical Analysis Chart | MarketScreener
Full-screen chart
Technical analysis trends INTERNATIONAL BUSINESS MAC
Short TermMid-TermLong Term
TrendsBearishNeutralBullish
Income Statement Evolution
Consensus
Sell
Buy
Mean consensus HOLD
Number of Analysts 23
Average target price 155,47  $
Last Close Price 135,04  $
Spread / Highest target 29,6%
Spread / Average Target 15,1%
Spread / Lowest Target -11,1%
EPS Revisions
Managers
NameTitle
Virginia M. Rometty Chairman, President & Chief Executive Officer
James J. Kavanaugh Chief Financial Officer & Senior Vice President
John E. Kelly Senior VP-Cognitive Solutions & Research
Martin Jetter SVP-Global Technology Services
Sidney Taurel Independent Director
Sector and Competitors
1st jan.Capitalization (M$)
INTERNATIONAL BUSINESS MACHINES CORPORATION18.80%119 629
ACCENTURE38.42%124 357
TATA CONSULTANCY SERVICES14.37%113 467
AUTOMATIC DATA PROCESSING28.86%73 319
VMWARE, INC.5.14%59 000
INFOSYS LTD17.54%46 111