G07C2009/00388

Method and System for Relay Attack Prevention Using Subzones
20220024412 · 2022-01-27 ·

A method of detecting if a relay is present in a PEPS system for a vehicle is provided. The PEPS system includes a plurality of predefined subzones within one or more vehicle inclusion zones and the method includes the steps of: (a) transmitting a challenge signal including an LF telegram and CW signals from one or more antennas associated with the vehicle to a key fob, the CW signals being measured by the key fob; and (b) determining if CW signals measured by the key fob meet predetermined magnetic field strength values associated with one or more subzones from a plurality of predefined subzones, the predefined subzones being derived to accept the magnetic field distributions at localised positions within a valid inclusion zone and reject magnetic field distributions generated by a relay at a relay transmitter.

Trusted device establishment
11190507 · 2021-11-30 · ·

A device implementing a trusted device establishment system includes at least one processor configured to receive, via a direct wireless connection and from an other device, a public key associated with the other device and an indication of a data item previously provided to the other device via an out-of-band channel. The at least one processor is further configured to verify that the indication of the data item corresponds to the data item previously provided to the other device, and store, in a secure memory region, the public key in association with an identifier corresponding to the other device when the indication of the data item is verified. The at least one processor is further configured to authorize the public key to access a secure device based at least in part on the public key being stored in the secure memory region.

DIGITAL METHOD FOR CONTROLLING ACCESS TO AN OBJECT, A RESOURCE OR SERVICE BY A USER
20220021547 · 2022-01-20 ·

Controlling access to an object or service by a user by a smart lock access control device involves sending by the smart lock to a virtual key a message comprising: the identifier of the smart lock (Lock-ID); a challenge (Ch1) created by the smart lock; the signature by the private key of the smart lock (Klock-priv) of information related to the identifier of the smart lock (Lock-ID) and challenge (Ch1); and the level of interaction required among at least two levels of interaction. The method verifies by the virtual key that the smart lock is known to it by comparison of the smart lock identifier received to that stored by the virtual key, validates by the virtual key of the signature by using the public key of the smart lock (Klock-pub); and, if the validation is positive, selects and implements the level of interaction received by the virtual key; and after validation of the interaction by the virtual key, and send a message by the virtual key to the smart lock comprising: the identifier of the virtual key (Key-ID); and a first opening key depending on the challenge received (Ch1) and the information (Kv1) contained in the virtual key; so that if the smart lock validates the opening key, it gives access to the object or service with the access level associated with the interaction level used.

SYSTEM FOR AUTHORIZING COMMUNICATION SYSTEM TO CONTROL REMOTE DEVICE

A control module for a remote device comprises a trainable transmitter configured to communicate a radio frequency signal configured to control the remote device via a first communication protocol. The control module further comprises a communication circuit configured to communicate with a mobile device via a second communication protocol and a user interface comprising at least one user input. The control module comprises a controller configured to communicate the programming information for the remote device with the remote server via the second communication interface and assign the programming information to the at least one user input. The controller is further configured to control the trainable transmitter to output a control signal based on the programming information in response to the at least one user input. The control signal is configured to control the remote device.

Secure wireless key system and method with dynamically adjustable modulation
11217049 · 2022-01-04 · ·

A system and method are described for securing a vehicle. For example, one embodiment of a method comprises: generating a secret related to a radio frequency (RF) signal characteristic to be transmitted by a key fob; securely sharing the secret between a vehicle and a wireless key fob; periodically transmitting a ping signal from the vehicle in a locked or inactive state; receiving a response ping signal to the ping signal, the response ping signal transmitted by the key fob; identifying at least a first RF signal characteristic associated with the response ping signal; determining whether the first RF signal characteristic is valid based on the secret; unlocking and/or activating the vehicle upon determining that the first RF signal characteristic is valid; and maintaining the locked or inactive state and/or requiring additional authentication if the first RF signal characteristic is invalid.

Passive entry/passive start access systems including round trip time sniffing

A system for includes master and sniffer devices. The master device includes: first antennas with different polarized axes; a transmitter transmitting a challenge signal via the first antennas from the vehicle to a slave device, where the slave device is a portable access device; and a receiver receiving a response signal in response to the challenge signal from the slave device. The sniffer device includes: second antennas with different polarized axes; and a receiver receiving, via the second antennas, the challenge signal from the transmitter and the response signal from the slave device. The sniffer device measures when the challenge signal and the response signal arrive at the sniffer device to provide arrival times. The master or sniffer device estimates at least one of a distance from the vehicle to the slave device or a location of the slave device relative to the vehicle based on the arrival times.

Systems and methods for delivering products via autonomous ground vehicles to restricted areas designated by customers

In some embodiments, methods and systems are provided that provide for facilitating delivery, via autonomous ground vehicles, of products ordered by customers of a retailer to customer-specified restricted areas accessible by an entryway openable via an access code.

ELECTRONIC ACCESS CONTROL AND LOCATION TRACKING SYSTEM
20230154256 · 2023-05-18 ·

A method and system that allows authorized individuals access into controlled access locations and the ability to grant temporary and limited access to guests into these locations. The method and system allow for navigational services to be provided to members and guests, and real-time tracking and confirmation to members and administrators that guests have arrived at their destination and did not enter any unauthorized areas. The method preferably can work through a system of wireless radio, sound and/or light-based beacons communicating with member and guest's electronic devices. Members and administrators can send one or more temporary electronic access keys to a guest's smartphone or other electronic device. Wireless radio, sound and/or light-based beacons provide an access control and location tracking system with real-time data about the member and guest whereabouts, allowing for the confirmation and tracking.

WIRELESS ACCESS CREDENTIAL SYSTEM

An access control system and methods according to at least one embodiment leverage wireless access credentials to allow a user to securely gain access to a secured area using his or her mobile device. As such, a credentialed mobile device may permit access to the secured area without requiring a real-time connection to a credential management system and/or an administrative system.

ACCESS MANAGEMENT SYSTEM AND ACCESS MANAGEMENT METHOD
20220417247 · 2022-12-29 · ·

According to one embodiment of the present application, provided is an access management method of an access control device, comprising the steps of: receiving, from a user terminal, a first advertising packet including open authentication information; generating a key on the basis of at least a first random key; confirming the open authentication information on the basis of the generated key; and determining the opening of a door on the basis of the open authentication information.