G07C2009/00555

LOCK CONTROL APPARATUS FOR VEHICLE AND METHOD OF CONTROLLING THE SAME
20230111997 · 2023-04-13 · ·

A lock control apparatus for a vehicle includes anchors to receive a signal transmitted from a terminal; a communication module to communicate using controller area network (CAN) communication; a detector installed on a door to input a detection signal; and a processor to receive the signal transmitted from the terminal from at least one of the anchors through the communication module, calculate a position of the terminal based on the signal transmitted from the terminal, determine whether to unlock the door in response to the position of the terminal and the detection signal, and control an engine to start. The processor controls the anchors to enter a sleep mode in response to waiting times of the anchors and resets the anchors to release the sleep mode and controls the anchors to enter a waiting mode in response to the number of anchors transmitting the signal from the terminal.

METHOD AND SYSTEM FOR PREVENTING A PHYSICAL LAYER RELAY ATTACK
20230074878 · 2023-03-09 ·

There is provided a method and a system for authorizing a user device to send a request to a vehicle in order to prevent a physical layer relay attack. The system comprises a vehicle comprising an acoustic transducer and an RF transceiver and a user device comprising an acoustic transducer and an RF transceiver. The method relates to a signaling scheme using a combination of acoustic and RF signals for preventing a successful physical layer relay attack.

INFORMATION PROCESSING DEVICE, INFORMATION PROCESSING METHOD, AND RECORDING MEDIUM STORING PROGRAM

An information processing device includes: a reception section that receives, from a user, setting processing for setting a time at which control of a vehicle using the information processing device is suppressed; and a transmission section that: in a case in which a first signal is received from the vehicle at a different time from the time at which control of the vehicle is suppressed, and in response to the information processing device vibrating or moving, transmits a second signal configured to enable control of the vehicle to be permitted, and in a case in which the first signal is received from the vehicle at the time at which control of the vehicle is suppressed, regardless of whether or not the information processing device is vibrating or moving, does not transmit the second signal.

PASSIVE DIGITAL KEY SYSTEMS
20220322085 · 2022-10-06 ·

Techniques are provided for validating a mobile device in a passive digital key system. An example method of validating a mobile device includes determining a positioning measurement for the mobile device relative to a reference point, obtaining a measured distance with at least a first transceiver, obtaining a calibration distance based at least in part on the positioning measurement for the mobile device, computing a validation distance based at least in part on a difference between the measured distance and the calibration distance, and validating the mobile device based at least in part on a comparison of the validation distance and a threshold value.

METHOD FOR TRIGGERING A FIRST DEVICE AS STEP FOR ACCESSING AN ACCESSIBLE DEVICE
20230202429 · 2023-06-29 · ·

A method for triggering a first device, the first device having at least one antenna for wireless communication with a second device having at least one antenna, the first device being an access device, for example, a key fob or smart device, or an accessible device, for example a vehicle, the second device being the other one of the accessible device and the access device, and the triggering of the first device being a step required for accessing the accessible device.

Passive remote keyless entry system with time-based anti-theft feature
09842445 · 2017-12-12 · ·

Method for preventing security breaches via the two-thief method of attack of passive remote keyless entry systems for vehicles. The method involves the measurement of air travel time of the RF messages between the RKE fob and the vehicle. Multiple round trips between the fob and the vehicle are employed to magnify the distance covered by the messages and thereby allow accurate measurement of the air travel time.

RELAY-ATTACK DETERRENCE RELAY-ATTACK DETERRENCE

A relay attack deterrence system includes a mobile platform including a plurality of mobile platform transmitter components and a mobile platform receiver component provided therein. The system further includes a fob device having a fob receiver component, a fob transmitter component, and a motion sensor component configured to produce motion information. The fob device is configured to receive, at the fob receiver component, one or more first signals from at least one of the plurality of mobile platform transmitter components and to selectably transmit, to the mobile platform receiver component, a second signal based on the motion information and position information derived from the one or more first signals.

Methods and apparatus for validating wireless access card authenticity and proximity
11676434 · 2023-06-13 · ·

A method includes performing, by a terminal with an access card, a first relay attack check for the access card in accordance with a local value associated with the terminal and a local value associated with the access card; determining, by the terminal, that the access card has passed the first relay attack check, and based thereon, performing, by the terminal with the access card, an authentication check of the access card in accordance with the local value associated with the terminal, the local value associated with the access card, and a local challenge value associated with the terminal; and determining, by the terminal, that the access card has passed the first relay attack check and the authentication check, and based thereon, validating, by the terminal, the access card.

METHOD AND SYSTEM FOR SECURE ACCESS TO A VEHICLE
20170327083 · 2017-11-16 · ·

A method for assessing a reliability of a determination of the relative position between a device for accessing a vehicle and the vehicle including transmitting a first radio signal from a first antenna of the vehicle; transmitting a second radio signal from a second antenna of the vehicle; receiving the first radio signal at the device and determining a first signal intensity; receiving the second radio signal at the device and determining a second signal intensity; determining, at the device or the vehicle, a relative position of the device and/or the vehicle and/or signal directions from which the radio signals have arrived at the device, based on the first signal intensity and the second signal intensity; determining a compatibility of the determined relative position and/or the signal directions with an arrangement of the first antenna and the second antenna at the vehicle to assess the reliability of relative position determination.

Method for preventing security breaches of a passive remove keyless entry system

The present invention relates to a method for preventing security breaches of a passive remote keyless entry system for authorizing access to a vehicle. The passive remote keyless entry system comprises a base station located at the vehicle and a mobile device, in particular a remote key, wherein the base station comprises a first processor unit and a first transceiver unit, the first transceiver unit comprises a timing device, the mobile device comprises a second processor unit and a second transceiver unit, an air travel time T of a single message sent back and forth from the base station to the mobile device is measured, and access to the vehicle is granted depending on the measured air travel time T.