G07C2009/00555

MULTIFAMILY ELECTRONIC LOCK CREDENTIAL MANAGEMENT
20220406113 · 2022-12-22 ·

An electronic lock access management system includes an electronic lock and a server system. In some embodiments, the server system includes a memory storing a database including a plurality of user accounts, each user account being associated with a set of privileges and one or more properties, each property being associated with one or more locks, each of the locks being associated with one or more access codes that are specific to each user. In some embodiments, the electronic lock stores, in the lock memory, an encrypted copy of an access code list received from the server system based on a set of access codes that are associated with the electronic lock in the database.

Method and system for preventing a physical layer relay attack
11528612 · 2022-12-13 · ·

There is provided a method and a system for authorizing a user device to send a request to a vehicle in order to prevent a physical layer relay attack. The system comprises a vehicle comprising an acoustic transducer and an RF transceiver and a user device comprising an acoustic transducer and an RF transceiver. The method relates to a signaling scheme using a combination of acoustic and RF signals for preventing a successful physical layer relay attack.

Systems and methods for delayed-message attack mitigation
11528153 · 2022-12-13 · ·

A computer-implemented method comprising: establishing, by an operation device, a wireless communication with a remote device; authenticating, by the operation device, the wireless communication with the remote device; receiving, at the operation device, a first command to perform a first operation; establishing a first maximum delay period using an estimated time delay, wherein the estimated time delay comprises an authentication delay, an encryption delay, or a combination thereof; determining, by the operation device, that the first command is received within a first maximum delay period; performing, by the operation device, the first operation; receiving, at the operation device, a second command to perform a second operation; establishing a second maximum delay period using the estimated time delay; determining, by the operation device, that the second command is received within a second maximum delay period; and performing, by the operation device, the second operation instructed in the second command.

Relay Attack Determination Device
20220379844 · 2022-12-01 ·

A portable device includes a reception antenna and a strength meter. The reception antenna includes antennas of three axes each receiving a first signal and a second signal. The strength meter measures a reception strength of the request signal and the request signal received by each of the three axes of the LF receiver. A relay attack determination device is provided with a comparator that executes a comparative process of strength ratios of the request signal and the request signal based upon a measurement value of the reception strength. In a case where the three axes include an ineffective axis, in which the measurement value of the reception strength of the request signal or the request signal deviates from a usable range, the comparator excludes the ineffective axis and executes the comparative process.

METHOD AND SYSTEM FOR RELAY ATTACK PREVENTION INCORPORATING CHANNEL COHERENCE
20220371551 · 2022-11-24 ·

A method/system of detecting if a relay is present in a vehicle PEPS system, including transmitting from antenna(s) of a vehicle, a first/second LF signals and determining a minimum time-gap between the signal transmissions so that the time-gap exceeds the channel-coherence-time of a high-frequency wireless-relay. A maximum time between the signals is determined by a timing requirement of the PEPS system and the maximum allowable change in a key-fob position. A time gap between the minimum/maximum times is determined. Depending on the time-gap, the system timing requirement is increased to provide a predetermined-time. At the predetermined-time, separately transmitting between the first/second LF signals, which have a known signal ratio, from a vehicle antenna to a key-fob as part of an LF challenge; measuring, at the key-fob, the signal-levels of the first/second LF signals; and determining if the ratio of the first/second LF signals are within a predefined range.

Method for checking the association of radio nodes and of objects with a radio environment
11503425 · 2022-11-15 · ·

A method for checking the association of radio nodes and objects to a radio environment with a radio node set having at least three radio nodes spaced apart from one another, each with a radio interface and its separate timer, wherein at least two radio nodes are reference radio nodes with known distances from one another and at least one radio node is a test radio node, the association of which with the radio environment of the reference radio node is checked. During a measuring process, signals are emitted and received by radio nodes of the radio node set, wherein at least two radio nodes of the radio node set operate as transceivers and at least one radio node exclusively operates as a transmitter or exclusively operates as a receiver or a transceiver.

Distance measuring device and distance measuring method

According to an embodiment, a first device includes: a first transceiver configured to transmit two or more first carrier signals using an output of a first reference signal source and to receive two or more second carrier signals; and a calculation unit, and a second device includes: a second transceiver configured to transmit the two or more second carrier signals using an output of a second reference signal source that operates independently of the first reference signal source and to receive the two or more first carrier signals. A frequency group of the two or more first carrier signals and a frequency group of the two or more second carrier signals are identical or substantially identical to each other, and the calculation unit calculates the distance between the first device and the second device based on a phase detection result obtained by receiving the first and second carrier signals.

Authentication Method, Medium, and Electronic Device
20230029683 · 2023-02-02 ·

An authentication method and an electronic device. The method includes sending, by a first device, in response to a first device determining that a distance between the first device and a second device reaches a first distance, a first request to the second device, so that the second device determines whether wireless communication between the first and second device is relayed before the first device performs a service, determining, in response to the distance between the first and second device reaching a second distance, whether success ciphertext sent by the second device is received, wherein the success ciphertext is sent in response to the second device determining that wireless communication between the first and second device is not relayed and the second distance being less than the first distance, and performing the service in response to reception and successful verification of the success ciphertext.

Method for securing a communication between a mobile communication apparatus and a vehicle

The invention relates to a method (100) for securing a communication between a mobile communication apparatus (10) and a vehicle (5), in particular for authentication at a passive access system of the vehicle (5), wherein the vehicle (5) comprises at least one radio unit (20).

Methods, devices and electronic keys for access-restricted environments

A method includes determining, by a first radio transceiver of an access-restricted environment, of first direction information of a first radio signal transmitted between the first radio transceiver and a wireless device. The method further includes determining, by a second radio transceiver of the access-restricted environment, of second direction information of a second radio signal transmitted between the second radio transceiver and the wireless device. The method further includes receiving, by the access-restricted environment, of angle information determined by an electronic key associated with the access-restricted environment. The method further includes determining, based on the first direction information, the second direction information and the angle information, whether the wireless device is a relay device or the electronic key. The method can be based, for example, on a Bluetooth technology.