Patent classifications
G07C2209/61
Passive entry/passive start access systems including round trip time sniffing
A system for includes master and sniffer devices. The master device includes: first antennas with different polarized axes; a transmitter transmitting a challenge signal via the first antennas from the vehicle to a slave device, where the slave device is a portable access device; and a receiver receiving a response signal in response to the challenge signal from the slave device. The sniffer device includes: second antennas with different polarized axes; and a receiver receiving, via the second antennas, the challenge signal from the transmitter and the response signal from the slave device. The sniffer device measures when the challenge signal and the response signal arrive at the sniffer device to provide arrival times. The master or sniffer device estimates at least one of a distance from the vehicle to the slave device or a location of the slave device relative to the vehicle based on the arrival times.
POSITION DETERMINATION DEVICE, POSITION DETERMINATION METHOD, AND VEHICULAR ELECTRONIC KEY SYSTEM
A position determination device includes at least one processor, a first communication device for transmitting a signal in a first frequency band, a second communication device for communicating with a vehicle mobile device using radio waves in a second frequency band different from the first frequency band. The at least one processor acquires first data indicating the reception state at the vehicle mobile device of a signal from the first communication device, acquires second data indicating the distance from the second communication device to the vehicle mobile device, and determines the location of the vehicle mobile device based on the acquired data.
READER COORDINATION FOR ACCESS CONTROL
Systems and methods for access control systems includes first and second access facilities, and first and second readers. The first reader is configured to control access through the first access facility. receive a credential using a first communication protocol from a device that stores the credential, and establish a secret with the device using the credential. The second reader is configured to control access through the second access facility. The first reader is configured to provide the secret to the second reader, and the second device is further configured to perform ranging using the secret and a second communication protocol different than the first communication protocol to identify intent information. Access through one of the first facility or the second facility is coordinated using the intent information.
Intelligent access system and method for a vehicle
A vehicle access control system configured to estimate, based on received message, at least one of distance, position, or direction of a target to the vehicle prior to initiating the engine of the vehicle, the vehicle access control system comprises a master node and at least one slave node. The target is in communication with the master node and the slave node via a communication link having low energy consumption.
Intelligent Access System and Method for a Vehicle
A vehicle access control system configured to estimate, based on received message, at least one of distance, position, or direction of a target to the vehicle prior to initiating the engine of the vehicle, the vehicle access control system comprises a master node and at least one slave node. The target is in communication with the master node and the slave node via a communication link having low energy consumption.
METHOD FOR ASSISTING IN DETERMINING THE POSITION OF AN IDENTIFIER IN RELATION TO A VEHICLE
The invention relates to a method (METH) for assisting in determining the position of an identifier (I) for accessing and starting a vehicle (V), relative to the vehicle (V), comprising: transmission (Em_TS.sub.vp), from a first device, either the vehicle (V) or the identifier (I) to a second device, different from the first, either the vehicle (V) or the identifier (I), at a transmission time t0, of an initial train (TS.sub.vp) of N sinusoidal signals, having identical amplitudes and respective frequencies f.sub.p, p[1;N], for any p between 1 and N1; reception (Rec_TS.sub.vp) by the second device of an image train (TS.sub.vp) corresponding to the initial train (TS.sub.vp, TS.sub.ip) altered by the transmission (Em_TS.sub.vp); construction (Cons_Sp.sub.v) of a frequency spectrum (Sp.sub.v) for the image train (TS.sub.vp); inverse Fourier transformation (TFI_Sp.sub.v) of the spectrum (Sp.sub.v), allowing a time signature (Sg.sub.v) to be obtained; first integration (Int1_Sg.sub.v) of the time signature (Sg.sub.v), between the transmission time t.sub.0 and a pre-determined intermediate time t.sub.int, producing a first result (Rlt1); second integration (Int2_Sg v) of the time signature (Sg.sub.v) between the intermediate time t.sub.int, and a pre-determined end time t.sub.f, producing a second result (Rlt2); comparison (Comp_1/2) of a ratio (R) of the first result (Rlt1) to the second result (Rlt2) with a threshold value (S), so that it is possible to determine if the identifier (I) is positioned inside the vehicle (V).
METHOD FOR DETERMINING A DISTANCE BETWEEN A VEHICLE AND AN IDENTIFIER
The invention concerns a method (METH) for measuring a distance (R) separating a vehicle (V) and an identifier (I) for accessing and starting the vehicle (V), the vehicle (V) and the identifier (I) being synchronised, the method (METH) comprising: transmission (Em_TS.sub.vp), from the vehicle (V) to the identifier (I), of a first stream (TS.sub.vp) of N first sinusoidal signals (S.sub.vp) of identical amplitudes and of regularly spaced pe[1;N] respective frequencies f.sub.pmeasurement (Mes_Dat) of phases (.sub.p) and amplitudes (a.sub.p), by the identifier (I), of signals of a first received image stream (TS.sub.vp) corresponding to the first stream (TS.sub.vp) altered by the transmissiontransmission (Tr_Dat) of the measured phases (.sub.p) and amplitudes (a.sub.p), from the identifier (I) to the vehicle (V)transmission (Em_TS.sub.ip), from the identifier (I) to the vehicle (V), of a second stream (TS.sub.ip) identical to the first stream (TS.sub.vp)construction (Cons_Sp) of a frequency spectrum (Sp) of the first image stream (TS.sub.vp) and of a second image stream (TS.sub.ip) corresponding to the second stream (TS) altered by the transmissionan inverse Fourier transform (TFI_Sp), making it possible to obtain a time signature (Sg)determination (Det_t.sub.d) of an intermediate time (t.sub.d) associated with a maximum of the time signature (Sg)calculation (Cal_R) of the distance (R) from the intermediate time (t.sub.d).
Detection and protection against jam intercept and replay attacks
Method and apparatus are disclosed for detection and protection against jam intercept and replay attacks. An example disclosed key fob includes a first wireless transceiver tuned to communicate via a first frequency band, second wireless transceiver tuned to communicate via a second frequency band, and a communicator. The first frequency band is different than the second frequency band. The example communicator sends a first message via the first wireless transceiver in response to activation of a first button. Additionally, the example communicator, in response to not receiving a second message via the second wireless transceiver, provides an alert.
Vehicle passive entry/passive start system
A combined vehicle passive entry/passive start (PEPS) and mobile electronic device wireless charging system. The system includes a vehicle transmitter configured to transmit a signal in accordance with a wireless charging protocol. The signal is transmitted through a first wireless communications channel for receipt by a mobile electronic device. A vehicle receiver is configured to receive response data from the mobile electronic device through a second wireless communications channel. The response data is generated by the mobile electronic device in response to receipt of the signal transmitted by the vehicle transmitter. A vehicle processor module is configured to at least one of unlock doors of the vehicle and start the vehicle in response to receipt of the response data by the vehicle receiver.
Physical access control systems with localization-based intent detection
Systems and techniques for a physical access control systems with localization-based intent detection are described herein. In an example, an access control system may regulate access to an asset. The access control system is adapted to establish a first connection with a key-device. The access control system may be further adapted to receive a credential for a user over the first connection. The access control system may be further adapted to establish a second connection with the key-device. The access control system may be further adapted to determine an intent of the user to access the asset. The access control system may use location data derived from the second connection to determine the intent of the user. The access control system may be further adapted to provide the credential to an access controller, based on identifying an intent of the user to access the asset.