Activation of cryptographically paired device

ABSTRACT

An event is detected at a first device. Responsive to the detection, at least some functionality of the first device is deactivated. The presence of a second device, cryptographically paired with the first device, is detected by the first device. Responsive to the detection, at least some functionality of the first device is activated or reactivated.

CROSS REFERENCES TO RELATED APPLICATIONS

This patent application is a continuation of U.S. patent applicationSer. No. 16/556,806, filed Aug. 30, 2019, which is a continuation ofU.S. patent application Ser. No. 15/984,218, filed May 18, 2018, nowU.S. Pat. No. 10,405,177, which is a continuation of U.S. applicationSer. No. 15/253,238, filed on Aug. 31, 2016, now U.S. Pat. No.10,034,167, which is a continuation of U.S. application Ser. No.12/191,282, for “Activation of Cryptographically Paired Device,” filedon Aug. 13, 2008, which claims priority from U.S. Provisional PatentApplication No. 60/979,035, for “Activation of Cryptographically PairedDevice,” filed on Oct. 10, 2007; the disclosures of which areincorporated by reference herein in their entirety.

TECHNICAL FIELD

The subject matter of this patent application is generally related toactivation or reactivation of electronic devices.

BACKGROUND

Some popular electronic devices installed in vehicles (e.g., a radio, anavigation system) include an anti-theft function where the device isautomatically deactivated when the device loses power (e.g., a batteryis removed). This function is designed to deter theft since the devicecannot be functioned outside the vehicle. For some devices, the usermust call an activation service to have the device reactivated.Typically, the user provides a serial number and/or other identifyinginformation to the activation service and the service automaticallyreactivates the device for the user. In some situations, however, theuser may not have the serial number and/or phone service to communicatewith the activation service. Other devices allow the user to manuallyenter a code into the device to reactivate the device. For manuallyactivated devices, the user may not remember the code and thereforecannot reactivate the device until the code can be obtained. Obtainingthe code may be difficult or impossible if the user forgot the code andthe code was written in a manual stored at a different location (e.g.,the user's home).

SUMMARY

An event is detected at a first device. Responsive to the detection, atleast some functionality of the first device is deactivated. Thepresence of a second device, cryptographically paired with the firstdevice, is detected by the first device. Responsive to the detection, atleast some functionality of the first device is activated orreactivated.

In some implementations, a vehicle can be activated by a first key(e.g., a master key) or a second key. The first key or master key canprovide the user unlimited access to the car or the car's featureswithout further authentication. The second key, however, initiates aprocess by which the car checks for the presence of a device (e.g., amobile phone, medial player, text messaging device) that has beenpreviously cryptographically paired with the car before allowing theuser access to the car or certain of the car's features. For example, acar owner may desire to allow other drivers to drive their car but onlyunder certain conditions, such as prohibiting the driver from sendinginstant messages while driving the car. The key can initiate a processwhere the car checks for the presence of the cryptographically paireddevice, and ensures that the messaging functionality of the device isdisabled before allowing the car to start.

DESCRIPTION OF DRAWINGS

FIG. 1 is a block diagram of an example system for activating orreactivating functionality of a cryptographically paired device.

FIG. 2 is a flow diagram of an example process for activating orreactivating functionality of a cryptographically paired device.

FIG. 3 is a block diagram of a cryptographically paired devicearchitecture for implementing the features described in reference toFIGS. 1-2.

DETAILED DESCRIPTION System Overview

FIG. 1 is a block diagram of an example system for activating orreactivating functionality of a cryptographically paired device. Thesystem includes cryptographically paired devices 102, 104 that arewithin transmission range of each other. The transmission range definesa region 100. While the devices 102, 104 are within the region 100, thedevices 102, 104 can detect each other's presence. Generally, thedevices 102, 104 can be mobile devices, wireless devices, tethereddevices, handheld computers, personal digital assistants, cellulartelephones, navigation devices, video game consoles, non-GPS head units(e.g., car stereos), digital cameras, laptops, or any other devicecapable of cryptographically pairing with another device. In theexamples that follow, device 102 is a navigation device installed in avehicle which has been cryptographically paired with a mobile device 104(e.g., a mobile phone) while operating in region 100 (e.g., inside thevehicle).

Navigation device 102 can include satellite navigation functionalitydesigned to acquire position data to locate a user on a road usingpreviously stored or newly acquired map databases. Navigation device 102can include circuitry and sensors for supporting a location determiningcapability, such as that provided by the global positioning system(GPS). In some implementations, navigation device 102 can implementmultiple device functionalities in addition to navigation, such asphone, email, and media processing functionalities, for example.

Mobile device 104 can be cryptographically paired with navigation device102 using known wireless or wired protocol. In one example, navigationdevice 102 and a mobile device 104 can be wirelessly paired to allowidentification, activation, or deactivation of one or more functions onnavigation device 102. The initial pairing can be implemented out ofband using, for example, Bluetooth pairing technology. In anotherexample, mobile device 104 can be tethered to navigation device 102using a wired communication link (e.g., Universal Serial Bus (USB)).Mobile device 104 can also be inserted in a dock (not shown) that istethered or wirelessly connected to navigation device 102. If mobiledevice 104 has not been previously paired or configured to function withnavigation device 102, a cryptographic pairing can be performed toestablish the pairing. A cryptographic pairing procedure can includenavigation device 102 scanning for mobile device 104 or other devices,such as discovery mode used by Bluetooth-enabled devices.

In some implementations, navigation device 102 can lock out the abilityto pair until a previously paired mobile device 104 is again detected.Navigation device 102 can deactivate some or all navigationfunctionality or other functionality until navigation device 102 detectsthe presence of the previously paired mobile device 104. For example, ifmobile device 104 is authenticated and a cryptographic pairing haspreviously occurred with navigation device 102, then navigation device102 can reactivate its deactivated functionality based on redetection ofmobile device 104. If the cryptographic pairing fails, navigation device102 can deactivate one or more of its functions based on the failedpairing. In some implementations, the failed pairing may simply disallowaccess to navigation device 102 by mobile device 104.

The cryptography technology used to initially pair navigation device 102and mobile device 104 can, for example, include various encryptiontechniques, cryptographic functions, protocols, and algorithms that canpair (e.g., bind) one or more devices to one another to ensure dataprotection and security between the devices. In some implementations, anumeric comparison association technique can be used tocryptographically pair mobile device 104 to navigation device 102. Thetechnique can be used when both navigation device 102 and mobile device104 are capable of displaying an n-digit number (e.g., 6 or 13 digits)and further, can allow a user to enter a selection, for example. Inother implementations, an out of band (OOB) technique can be used tocryptographically pair mobile device 104 to navigation device 102. Thetechnique can be used when an OOB mechanism is used to both discoverdevices as well as exchange or transfer cryptographic numbers used inthe pairing process. In yet other implementations, a “passkey entry”technique can be used to cryptographically pair mobile device 104 tonavigation device 102. The passkey technique can be used when navigationdevice 102 has input capability, but does not have the capability todisplay n-digits and the mobile device 104 device has outputcapabilities, for example. Other pairing techniques are also possible.Implementing any or all of the above pairing techniques alone or incombination can provide an advantage to the user by ensuringauthenticity of a particular device including user identification anddata integrity.

In some implementations, mobile device 104 may become undetectable bynavigation device 102 when mobile device 104 is no longer proximate tonavigation device 102, such as would occur when mobile device 104travels outside region 100. In such a scenario, navigation device 102may be locked or deactivated until mobile device 104 reenters region100. In this example, region 100 could be the interior of the vehicle.For example, if the user leaves the vehicle holding the mobile device104 in their hand, navigation device 102 can deactivate usage of any orall its functionality until the mobile device 104 is again available fordetection (e.g., within the vehicle). In some implementations,navigation device 102 can lose power or detect unauthorized use and inresponse deactivate at least some of its own functionality including,but not limited to, pairing functions, communication functions, mobilephone functions, and radio functions. The redetection of mobile device104 by navigation device 102 can initiate a reactivation of one or moredeactivated functions of navigation device 102.

In some implementations, the cryptographic pairing can deter theft ormisuse of information or property. For example, the owner of navigationdevice 102 can specify one or mobile devices for use with navigationdevice 102. In particular, the navigation device 102 can includeconfiguration menus to allow users to prevent users with unauthorizeddevices from using or abusing functionality of navigation device 102.Navigation device 102 can be configured to allow the owner of thevehicle to operate the navigation device 102 if the owner is carryingthe authorized mobile device 104 on her person. When the authorizedmobile device 104 is cryptographically paired with navigation device102, full functionality may be allowed on navigation device 102. Incontrast, if a user who does not have an authorized mobile device 104,one or more functions on navigation device 102 can be locked until anauthorized mobile device 104 is detected by the navigation device 102.

In some implementations, cryptographic pairing can be used to defineusers and/or user limits for using navigation device 102. Navigationdevice 102 can be configured to wirelessly activate or deactivate one ormore functions when mobile device 104 is present. For example, a driverowning mobile device 104 can have restrictions on using navigationdevice 102. For example, if the driver exceeds a preset speed limit, ordrives the vehicle out of an approved location, navigation device 102may lock down a stereo system, phone function, or other function untilthe driver lowers the speed or returns to an approved location. Themobile device 104 could also cause a speed limiter in the vehicle totrigger, thus preventing the vehicle from exceeding a certain speed,instead of, or in addition to, disabling some functionality until thespeed is reduced.

In some implementations, several devices (e.g., mobile phones,head-sets, etc.) can be configured to pair with navigation device 102.If several devices are proximate to navigation device 102, one devicecan be selected as an “always link to” device. For example, an owner ofnavigation device 102 can configure navigation device 102 to accept onemobile device over others mobile devices when several viable linkingmobile devices are detected.

In some implementations, cryptographic pairing can be performedautomatically using a tethered protocol such as USB. For example, a usercan access a menu on mobile device 104 to place mobile device 104 in atethered pairing mode. Similarly, the user can access a menu onnavigation device 102 to enable searching for a particular mobile device104. At some point, navigation device 102 can search for mobile device104. The cryptographic pairing can occur upon detecting the presence ofmobile device 104 over the USB cable.

In some implementations, a degree of privacy can be achieved by enablingnavigation device 102 usage based on a cryptographic pairing. Forexample, encrypted pairing information (e.g., previous pairinginformation or passkey information) can be used to authenticate mobiledevice 104 for purposes of gaining access to the navigation device 102.

Example Process

FIG. 2 is a flow diagram of an example process 200 for activating orreactivating functionality of a cryptographically paired device. Whilethe reactivating process 200 described below includes a number ofoperations that appear to occur in a specific order, it should beapparent that the process 200 can include more or fewer operations,which can be executed serially or in parallel (e.g., using parallelprocessors or a multi-threading environment).

In some implementations, the process 200 includes detecting an event ata first device (202). For example, the event can be detected by thedevice 102. The event can include a power loss (e.g., battery removal ordrainage) of the first device, a lock down, active or passive eavesdrop(e.g., an attack by an external device, hacker, etc.), or another eventcausing the first device to suspect unauthorized access or loss ofpower.

In response to one or more events, the first device can deactivate atleast some of its functionality (204). For example, if the first deviceis a navigation device or multimedia system, then the first device candeactivate some or all of its navigation functions, mobile phonefunctions, communication functions, and radio functions on navigationdevice 102. The deactivation can include locking some or allfunctionality on the first device from any or all users, based on thepower loss or a detected security breach, for example. In someimplementations, the deactivation can include locking out otherfeatures, such as communication protocols. For example, if anunauthorized access is detected, the first device can disable itscommunication ports (wired or wireless) until a user code is entered, oran authorized pairing occurs (e.g., approved cryptographic pairing witha second device). In particular, a pairing with an authorized seconddevice may be requested by the first device to reactivate some or allfunctionality, for example.

In the event some functionality of the first device is deactivated, thefirst device (e.g., device 102), or another paired device, can perform asearch for, or detect the presence of, a second device (e.g., device104) cryptographically paired with the first device (e.g., device 102)using a wired or wireless communication link (206). With a wirelesscommunication link, the first device (e.g., navigation system 102) canwirelessly search for a previously paired Bluetooth enabled seconddevice (e.g., mobile device 104). For example, the search may beperformed upon replacing a vehicle battery or reattaching a wiredvehicle navigation system.

In response to detecting the second device, the first device caninitiate activation or reactivation of one or more of its features orfunctions (208). For example, if the first device is a navigation ormultimedia system, then upon detecting a second device (e.g., mobilephone or smart phone), the navigation or multimedia system can unlock,activate or reactivate all or a portion of its functionality. Theunlocking, activation or reactivation can be based on the identifyingsecond device, as a previously paired or authenticated device.

In some implementations, in response to detecting the second device, thefirst device can initiate a locking or deactivation of one or more ofits features or functions. In this case, the second device acts aswireless key or remote control for locking out the first device or itsfunctionality. For example, when the user leaves a vehicle, the seconddevice (e.g., a mobile device) can automatically shutdown down the firstdevice (e.g., a navigation or multimedia system, stereo system, handsfree telephone) as a security precaution, regardless of whether therewas a power loss, security breach or other triggering event.

Paired Device Architecture

FIG. 3 is a block diagram of an example system architecture for acryptographically paired device (e.g., devices 102, 104 of FIG. 1) forimplementing the features described in reference to FIGS. 1 and 2. Apaired device 300 generally includes one or more computer-readablemediums 302, a processing system 304, an Input/Output (I/O) subsystem306, radio frequency (RF) circuitry 308, and audio circuitry 310. Thesecomponents may be coupled by one or more communication buses or signallines 303. The paired device 300 can be any portable electronic device,including but not limited to, an earpiece, a handheld computer, a tabletcomputer, a mobile phone, a media player, a personal digital assistant(PDA) and the like, including a combination of two or more of theseitems.

It should be apparent that the architecture shown in FIG. 3 is only oneexample of an architecture for the paired device 300, and that thedevice 300 could have more or fewer components than shown, or adifferent configuration of components. The various components shown inFIG. 3 can be implemented in hardware, software, or a combination ofboth hardware and software, including one or more signal processingand/or application specific integrated circuits. The RF circuitry 308(e.g., a wireless transceiver) is used to send and receive informationover a wireless link or network to one or more other devices andincludes well-known circuitry for performing this function, includingbut not limited to an antenna system, an RF transceiver, one or moreamplifiers, a tuner, one or more oscillators, a digital signalprocessor, a CODEC chipset, memory, etc. In some embodiments, the RFcircuitry 308 is capable of establishing and maintaining communicationswith other devices using one or more communications protocols, includingbut not limited to time division multiple access (TDMA), code divisionmultiple access (CDMA), global system for mobile communications (GSM),Enhanced Data GSM Environment (EDGE), wideband code division multipleaccess (W-CDMA), Wi-Fi (such as IEEE 802.11a, IEEE 802.11b, IEEE 802.11gand/or IEEE 802.11n), Bluetooth, Wi-MAX, voice over Internet Protocol(VoIP), a protocol for email, instant messaging, and/or a short messageservice (SMS), or any other suitable communication protocol, includingcommunication protocols not yet developed as of the filing date of thisdocument.

The RF circuitry 308 and the audio circuitry 310 are coupled to theprocessing system 304 via the peripherals interface 316. The interface316 includes various known components for establishing and maintainingcommunication between peripherals and the processing system 304. Theaudio circuitry 310 is coupled to an audio speaker 350 and a microphone352 and includes known circuitry for providing telephony functions, suchas processing voice signals received from interface 316 to enable a userto communicate in real-time with other users, for example. In someembodiments, the audio circuitry 310 includes a headphone jack (notshown). Voice and data information received by the RF circuitry 308 andthe audio circuitry 310 (e.g., in speech recognition or voice commandapplications) is sent to one or more processors 318 via the peripheralsinterface 316. The one or more processors 318 are configurable toprocess various data formats for one or more applications programs 330stored on the medium 302.

Note that the term “data” includes but is not limited to text, graphics,Web pages, JAVA applets, widgets, emails, instant messages, voice,digital images or video, widgets, MP3s, etc., which can be used by oneor more applications programs 330 stored on the medium 302 (e.g., Webbrowser, email, etc.).

The peripherals interface 316 couples the input and output peripheralsof the device to the processor 318 and the computer-readable medium 302.The one or more processors 318 communicate with the one or morecomputer-readable mediums 302 via a controller 320. Thecomputer-readable medium 302 can be any device or medium that can storecode and/or data for use by the one or more processors 318. The medium302 can include a memory hierarchy, including but not limited to cache,main memory and secondary memory. The memory hierarchy can beimplemented using any combination of RAM (e.g., SRAM, DRAM, DDRAM), ROM,FLASH, magnetic and/or optical storage devices, such as disk drives,magnetic tape, CDs (compact disks) and DVDs (digital video discs). Themedium 302 may also include a transmission medium for carryinginformation-bearing signals indicative of computer instructions or data(with or without a carrier wave upon which the signals are modulated).For example, the transmission medium may include a communicationsnetwork, including but not limited to the Internet (also referred to asthe World Wide Web), intranet(s), Local Area Networks (LANs), Wide LocalArea Networks (WLANs), Storage Area Networks (SANs), Metropolitan AreaNetworks (MAN) and the like.

The one or more processors 318 run various software components stored inthe medium 302 to perform various functions for the device 300. In someembodiments, the software components include an operating system 322, auser interface module (or set of instructions) 324, a contact/motionmodule (or set of instructions) 326, a communication module (or set ofinstructions) 328, and one or more applications (or set of instructions)330. The communication module 328 can be used to implement some of theoperations (e.g., Bluetooth pairing) as described in reference to FIGS.1 and 2.

The operating system 322 (e.g., Darwin, RTXC, LINUX, UNIX, OS X,WINDOWS, or an embedded operating system such as VxWorks) includesvarious procedures, sets of instructions, software components and/ordrivers for controlling and managing general system tasks (e.g., memorymanagement, storage device control, power management, etc.) andfacilitates communication between various hardware and softwarecomponents.

The user interface module 324 facilitates and manages user-receivedinput. In some implementations, the user interface module 324 may bedesigned to receive a user input and translate the input into aparticular response. The response can be presented in a display as asidebar layout, a web page layout, an audio sound, or any other layoutthat allows for the presentation of user-customizable content.

The communication module 328 facilitates communication with otherdevices over one or more external ports or via RF circuitry 308 andincludes various software components for handling data received from theRF circuitry 308 and/or the external port. The RF circuitry 308 (e.g.,Bluetooth) is adapted for coupling directly to other devices orindirectly over a network (e.g., the Internet, wireless LAN, etc.).

The Bluetooth circuitry provides for connecting and/or pairing devices,such as device 102 and 104. In some implementations, the circuitry canprovide a way to connect and exchange information between devices suchas mobile phones, laptops, PCs, navigation systems, printers, digitalcameras, and video game consoles over a secure, short-range radiofrequency.

The one or more applications 330 can include any applications installedon the device 300, including without limitation, a browser, addressbook, contact list, email, instant messaging, word processing, keyboardemulation, widgets, JAVA-enabled applications, encryption, digitalrights management, voice recognition, voice replication, locationdetermination capability (such as that provided by the globalpositioning system (GPS)), a music player (which plays back recordedmusic stored in one or more files, such as MP3 or AAC files), etc.

The contact/motion module 326 includes various software components forperforming various tasks associated with the touch-sensitive displaysystem 312, as previously described with respect to the embodiments inFIGS. 1-3.

The I/O subsystem 306 is coupled to the touch-sensitive display system312 and a vehicle interface 314 for controlling or performing variousfunctions, such as power control, speaker volume control, ring toneloudness, keyboard input, scrolling, hold, menu, screen lock, clearingand ending communications and the like. The touch-sensitive display 312communicates with the processing system 304 via the touch sensitivescreen controller 332, which includes various components for processinguser input (e.g., scanning hardware). The one or more other inputcontrollers 334 receives/sends electrical signals from/to the vehicleinterface 314. The vehicle interface 314 may include physical buttons(e.g., push buttons, rocker buttons, etc.), dials, slider switches,sticks, and so forth.

The touch-sensitive display 312 displays visual output to the user in aGUI. The visual output may include text, graphics, video, and anycombination thereof. Some or all of the visual output may correspond touser-interface objects. The touch-sensitive display 312 may also acceptinput from the user based on haptic and/or tactile contact. Thetouch-sensitive display 312 forms a touch-sensitive surface that acceptsuser input, including multiple touches and finger gestures (e.g., amulti-touch-sensitive surface). The touch-sensitive display 312 and thetouch screen controller 332 (along with any associated modules and/orsets of instructions in the medium 302) detects contact (and anymovement or release of the contact) and finger gestures on thetouch-sensitive display 312 and converts the detected contact orgestures into interaction with user-interface objects, such as one ormore soft keys, that are displayed on the touch screen when the contactoccurs. In an exemplary embodiment, a point of contact between thetouch-sensitive display 312 and the user corresponds to one or moredigits of the user. The touch-sensitive display 312 may use LCD (liquidcrystal display) technology, or LPD (light emitting polymer display)technology, although other display technologies may be used in otherembodiments. The touch-sensitive display 312 and touch screen controller332 may detect contact and any movement or release thereof using any ofa plurality of touch sensitivity technologies, including but not limitedto capacitive, resistive, infrared, and surface acoustic wavetechnologies, as well as other proximity sensor arrays or other elementsfor determining one or more points of contact with the touch-sensitivedisplay 312.

The touch-sensitive display may be analogous to the multi-touchsensitive tablets described in the following U.S. Pat. No. 6,323,846(Westerman et al.), U.S. Pat. No. 6,570,557(Westerman et al.), and/orU.S. Pat. No. 6,677,932 (Westerman), and/or U.S. Patent Publication2002/0015024A1, each of which is hereby incorporated by reference.However, the touch screen 126 displays visual output from the portabledevice, whereas touch sensitive tablets do not provide visual output.The touch-sensitive display 312 may have a resolution in excess of 100dpi. In an exemplary embodiment, the touch-sensitive display 312 mayhave a resolution of approximately 168 dpi. The user may make contactwith the touch-sensitive display 312 using any suitable object orappendage, such as a stylus, pen, finger, and so forth.

In some embodiments, in addition to the touch screen, the device 300 mayinclude a touchpad (not shown) for activating or deactivating particularfunctions. In some embodiments, the touchpad is a touch-sensitive areaof the device that, unlike the touch screen, does not display visualoutput. The touchpad may be a touch-sensitive surface that is separatefrom the touch-sensitive display 312 or an extension of thetouch-sensitive surface formed by the touch-sensitive display 312.

The device 300 also includes a power system 344 for powering the varioushardware components. The power system 344 can include a power managementsystem, one or more power sources (e.g., battery, alternating current(AC)), a recharging system, a power failure detection circuit, a powerconverter or inverter, a power status indicator (e.g., a light emittingdiode (LED)) and any other components typically associated with thegeneration, management and distribution of power in portable devices.

In some embodiments, the peripherals interface 316, the one or moreprocessors 318, and the memory controller 320 may be implemented on asingle chip, such as the processing system 304. In some otherembodiments, they may be implemented on separate chips.

The described features can be implemented advantageously in one or morecomputer programs that are executable on a programmable system includingat least one programmable processor coupled to receive data andinstructions from, and to transmit data and instructions to, a datastorage system, at least one input device, and at least one outputdevice. A computer program is a set of instructions that can be used,directly or indirectly, in a computer to perform a certain activity orbring about a certain result. A computer program can be written in anyform of programming language (e.g., Objective-C, Java), includingcompiled or interpreted languages, and it can be deployed in any form,including as a stand-alone program or as a module, component,subroutine, or other unit suitable for use in a computing environment.

Suitable processors for the execution of a program of instructionsinclude, by way of example, both general and special purposemicroprocessors, and the sole processor or one of multiple processors orcores, of any kind of computer. Generally, a processor will receiveinstructions and data from a read-only memory or a random access memoryor both. The essential elements of a computer are a processor forexecuting instructions and one or more memories for storing instructionsand data. Generally, a computer will also include, or be operativelycoupled to communicate with, one or more mass storage devices forstoring data files; such devices include magnetic disks, such asinternal hard disks and removable disks; magneto-optical disks; andoptical disks. Storage devices suitable for tangibly embodying computerprogram instructions and data include all forms of non-volatile memory,including by way of example semiconductor memory devices, such as EPROM,EEPROM, and flash memory devices; magnetic disks such as internal harddisks and removable disks; magneto-optical disks; and CD-ROM and DVD-ROMdisks. The processor and the memory can be supplemented by, orincorporated in, ASICs (application-specific integrated circuits).

To provide for interaction with a user, the features can be implementedon a computer having a display device such as a CRT (cathode ray tube)or LCD (liquid crystal display) monitor for displaying information tothe user and a keyboard and a pointing device such as a mouse or atrackball by which the user can provide input to the computer.

A number of implementations have been described. Nevertheless, it willbe understood that various modifications may be made. For example,elements of one or more implementations may be combined, deleted,modified, or supplemented to form further implementations. As yetanother example, the logic flows depicted in the figures do not requirethe particular order shown, or sequential order, to achieve desirableresults. In addition, other steps may be provided, or steps may beeliminated, from the described flows, and other components may be addedto, or removed from, the described systems. Accordingly, otherimplementations are within the scope of the following claims.

What is claimed is:
 1. A method comprising: detecting, at a firstsubsystem of a vehicle, a mobile computing device proximate to the firstsubsystem of the vehicle based on a transmission range of the mobilecomputing device from the first subsystem of the vehicle; determining,by the first subsystem of the vehicle, whether the mobile computingdevice and the first subsystem of the vehicle are cryptographicallypaired; and in response to determining that the mobile computing devicehas previously established the cryptographic pairing with the firstsubsystem of the vehicle, setting, by the first subsystem of thevehicle, a functionality of a second subsystem of the vehicle to asecond state.
 2. The method according to claim 1, wherein the detecting,at the first subsystem of the vehicle, the mobile computing deviceproximate to the first subsystem of the vehicle comprises detecting thatthe mobile computing device is within a predetermined area from thefirst subsystem of the vehicle.
 3. The method according to claim 1,wherein the mobile computing device and the first subsystem of thevehicle are within a region.
 4. The method according to claim 3, whereinthe region is inside the vehicle.
 5. The method according to claim 1,wherein the mobile computing device is Bluetooth enabled.
 6. The methodaccording to claim 3, wherein the first subsystem of the vehicle detectsthat the mobile computing device is proximate to the first subsystem ofthe vehicle by wirelessly searching for the mobile computing device thatis Bluetooth enabled.
 7. The method according to claim 1, wherein themobile computing device is a wearable device, mobile phone, wireless keyor remote control for controlling a functionality of the first subsystemof the vehicle.
 8. The method according to claim 1, wherein the mobilecomputing device is wireless key or remote control for locking outfunctionality of the first subsystem of the vehicle.
 9. The methodaccording to claim 1, wherein the first subsystem of the vehicle is afirst device and the mobile computing device is a second device.
 10. Themethod according to claim 9, wherein the first subsystem of the vehicleand the second subsystem of the vehicle are in the first device.
 11. Themethod according to claim 1, wherein the mobile computing device iscryptographically paired with the first subsystem of the vehicle using awireless or wired protocol.
 12. The method according to claim 1, whereinthe first subsystem of the vehicle is a navigation system.
 13. Themethod according to claim 1, wherein the second subsystem of the vehicleis a navigation system, a multimedia system, a stereo system, or a handsfree telephone.
 14. A first subsystem for a vehicle, the first subsystemcomprising: a processor; and a computer-readable medium coupled to theprocessor and storing instructions that, when executed by the processor,cause the processor to: detect a mobile computing device proximate tothe first subsystem of the vehicle based on a transmission range of themobile computing device from the first subsystem of the vehicle;determine whether the mobile computing device and the first subsystem ofthe vehicle are cryptographically paired; and in response to determiningthat the mobile computing device has previously established thecryptographic pairing with the first subsystem of the vehicle, set afunctionality of a second subsystem of the vehicle to a second state.15. The first subsystem for the vehicle according to claim 14, whereinthe detecting, at the first subsystem of the vehicle, the mobilecomputing device proximate to the first subsystem of the vehiclecomprises detecting that the mobile computing device is within apredetermined area from the first subsystem of the vehicle.
 16. Thefirst subsystem for the vehicle according to claim 14, wherein themobile computing device and the first subsystem of the vehicle arewithin a region.
 17. A non-transitory computer-readable storage mediumhaving stored therein program instructions that, when executed by aprocessor in a first subsystem of a vehicle, cause the processor toperform a method comprising: detecting, at the first subsystem of avehicle, a mobile computing device proximate to the first subsystem ofthe vehicle based on a transmission range of the mobile computing devicefrom the first subsystem of the vehicle; determining, by the firstsubsystem of the vehicle, whether the mobile computing device and thefirst subsystem of the vehicle are cryptographically paired; and inresponse to determining that the mobile computing device has previouslyestablished the cryptographic pairing with the first subsystem of thevehicle, setting, by the first subsystem of the vehicle, a functionalityof a second subsystem of the vehicle to a second state.
 18. Thenon-transitory computer-readable storage medium according to claim 17,wherein the detecting, at the first subsystem of the vehicle, the mobilecomputing device proximate to the first subsystem of the vehiclecomprises detecting that the mobile computing device is within apredetermined area from the first subsystem of the vehicle.
 19. Thenon-transitory computer-readable storage medium according to claim 17,wherein the mobile computing device and the first subsystem of thevehicle are within a region.