G07C2209/61

Passive remote keyless entry system with level-based anti-theft feature
10543808 · 2020-01-28 · ·

Method for preventing security breaches via the two-thief method of attack of passive remote keyless entry systems for vehicles. The method involves the transmission of a signal between a fob and the vehicle, where the level of the signal changes in a particular pattern. At the receiving side, anomalies in the pattern of the received signal (e.g., levels, timing) are detected and used to detect attempts to mimic the signal.

METHOD FOR PREVENTING SECURITY BREACHES OF A PASSIVE REMOVE KEYLESS ENTRY SYSTEM
20200020184 · 2020-01-16 ·

The present invention relates to a method for preventing security breaches of a passive remote keyless entry system for authorizing access to a vehicle. The passive remote keyless entry system comprises a base station located at the vehicle and a mobile device, in particular a remote key, wherein the base station comprises a first processor unit and a first transceiver unit, the first transceiver unit comprises a timing device, the mobile device comprises a second processor unit and a second transceiver unit, an air travel time T of a single message sent back and forth from the base station to the mobile device is measured, and access to the vehicle is granted depending on the measured air travel time T.

ULTRA-WIDE BAND DEVICE FOR ACCESS CONTROL READER SYSTEM

A device connectable to a reader of an access control system includes an antenna, an ultra-wide band (UWB) front end circuit, a controller, and a communication link. The (UWB) front end circuit is connected to the antenna to facilitate UWB communication with a credential device. The controller is connected to the UWB front end and configured to perform ranging for the credential device using the UWB communication. The communication link is configured to interface with the reader.

Ultra-wide band device for access control reader system

A reader system for an access control system includes first and second antennas and first and second controllers. The first controller is configured to communicate with a credential device using a first communication protocol via the first antenna to exchange a credential with the credential device. The second controller is configured to communicate with the credential device using a second communication protocol via the second antenna to perform ranging for the credential device and is configured to communicate with the first controller via a communication link.

METHOD FOR REMOTELY OPERATING AN AUTOMATIC BUILDING OR ENCLOSURE CLOSURE, RADIO REMOTE CONTROL TRANSMITTER THEREFOR, BUILDING OR ENCLOSURE CLOSURE SYSTEM, AND COMPUTER PROGRAM
20240062600 · 2024-02-22 · ·

In order to enable higher operational and manipulation security in the radio remote control of building or enclosure closures by simple means, the invention provides a method for remote control of an automatic building or enclosure closure (12.1, 12.2, 12.3), comprising: a) transmitting actuation signals (32.1-32.3) with authorization data by means of a transmitter (14) by radio, b) receiving the actuation signals (32.1, 32.2, 32.3) by a receiver, c) determining the authorization on the basis of the received data, and d) controlling the building or enclosure closure (12.1, 12.2, 12.3) to perform the action when authorization is available; wherein in step a) a first actuation signal (32.1) is repeatedly transmitted alternately on a first frequency using a first modulation and a second actuation signal (32.2) is transmitted on a second frequency using a second modulation, and in step b) radio signals are first received on the first frequency using the first modulation over a time longer than the transmission of the first actuation signal and then radio signals are received on the second frequency using the second modulation over a time longer than the transmission of the second actuation signal.

Reader coordination for access control

Systems and methods for access control systems includes first and second access facilities, and first and second readers. The first reader is configured to control access through the first access facility, receive a credential using a first communication protocol from a device that stores the credential, and establish a secret with the device using the credential. The second reader is configured to control access through the second access facility. The first reader is configured to provide the secret to the second reader, and the second device is further configured to perform ranging using the secret and a second communication protocol different than the first communication protocol to identify intent information. Access through one of the first facility or the second facility is coordinated using the intent information.

Ultra-wide band device for access control reader system

A device connectable to a reader of an access control system includes an antenna, an ultra-wide band (UWB) front end circuit, a controller, and a communication link. The (UWB) front end circuit is connected to the antenna to facilitate UWB communication with a credential device. The controller is connected to the UWB front end and configured to perform ranging for the credential device using the UWB communication. The communication link is configured to interface with the reader.

Security system
11975686 · 2024-05-07 · ·

A security system includes a portable terminal, a communication device communicating with the portable terminal, and a determination unit determining validity of the portable terminal. Phase data acquired from distance measuring radio wave is used to determine validity of communication between the portable terminal and the communication device. The received phase data of the distance measuring radio wave varies according to the distance from a transmission source. When the communication device and the portable terminal are fixed, and the communication device and the portable terminal have transmitted and received distance measuring radio waves having the same specific frequency, vehicle acquisition phase data and terminal acquisition phase data are the same. The determination unit determines, by using this two types of phase data, the validity of communication between the communication device and the portable terminal is determined.

Vehicle door handle with antenna arrangement

A vehicle door handle for use on a motor vehicle includes a handle and a handle support, the handle being mounted in the handle support, the handle is configured in the form of an elongated body, with a first end section, a second end section and a gripping section. Bearing sections project into the handle support and are supported there. In a cavity of the handle, an antenna for UWB signal transmission is arranged and coupled with a control circuit. In a further development of the invention, it is coupled with a proximity sensor. An authentication system and the use of an inventive vehicle door handle in an authentication system is also disclosed.

Physical access control systems with localization-based intent detection

Systems and techniques for a physical access control systems with localization-based intent detection are described herein. In an example, an access control system may regulate access to an asset. The access control system is adapted to receive a credential for the asset from a key device associated with a user using a first wireless connection. The access control system may be further adapted to store the credential in a cache of memory. The access control system may be further adapted to establish a second wireless connection with the key device. The access control system may be further adapted to request a validation of the credential from an authorization service in response to establishing the second wireless connection with the key device. The access control system may receive a validation token from the authorization service. The access control system may be further adapted to store the validation token in the cache.