a means for authenticating devices, including use of the ignition key, and PINs. [0213] The Related Applications also describe how the resource control and security features characteristic of the proxy might be centralized on one device, such as a gateway, or distributed throughout the network.