Patent classifications
G07C2009/00555
Information processing apparatus, information processing method, and system
An information processing apparatus including a control unit configured to acquire a distance between a vehicle and a user terminal based on position information of the vehicle and position information of the user terminal, and generate a command for setting or releasing a remote immobilizer function and a smart cancel function based on the distance between the vehicle and the user terminal. The remote immobilizer function is a function for remotely setting or releasing an immobilizer of the vehicle. The smart cancel function is a function for stopping radio waves transmitted from the vehicle for communication between the vehicle and a key of the vehicle.
Method of driving a component of a vehicle, system, computer program product and computer-readable medium
Driving a component of a vehicle by using a portable user identification device for the vehicle and an user identification unit of the vehicle, whereat a controller evaluates an identifying signal sent by a transmitter of the portable user identification device to a receiver of the user identification unit and the controller drives the component of the vehicle according to the evaluation of the identifying signal. In order to provide a higher level of security by driving a component of a vehicle by using a portable user identification device for a vehicle, to a point of time t.sub.n a position of the portable user identification device relative to a position of the portable user identification device to a point of time t.sub.n=t.sub.l, to which the portable user identification device is departing from the vehicle, is determined and stored in a memory on a regular basis.
METHODS AND APPARATUS FOR VALIDATING WIRELESS ACCESS CARD AUTHENTICITY AND PROXIMITY
A method includes performing, by a terminal with an access card, a first relay attack check for the access card in accordance with a local value associated with the terminal and a local value associated with the access card; determining, by the terminal, that the access card has passed the first relay attack check, and based thereon, performing, by the terminal with the access card, an authentication check of the access card in accordance with the local value associated with the terminal, the local value associated with the access card, and a local challenge value associated with the terminal; and determining, by the terminal, that the access card has passed the first relay attack check and the authentication check, and based thereon, validating, by the terminal, the access card.
SYSTEM FOR PREVENTING VEHICLE KEY FOB RELAY ATTACKS
A vehicle subscribed to an authentication system includes a wireless transceiver; and a controller, configured to responsive to receiving a wireless signal from a device identified as a key fob via the wireless transceiver, obtain history data reflecting time and location of the key fob associated with the vehicle detected via one or more entities subscribed to the authentication system, calculate a sanity value using the history data, such that a distant detection location from the vehicle location at a time before present time results in a lesser sanity value and a nearby detection location from the vehicle location at substantially the same time before the present time results in a greater sanity value, calculate a sanity threshold using at least one of the present time and the vehicle location, and responsive to the sanity value being greater than the sanity threshold, unlock a door of the vehicle.
LOCK CONTROL APPARATUS FOR VEHICLE AND METHOD OF CONTROLLING THE SAME
A lock control apparatus for a vehicle includes anchors to receive a signal transmitted from a terminal; a communication module to communicate using controller area network (CAN) communication; a detector installed on a door to input a detection signal; and a processor to receive the signal transmitted from the terminal from at least one of the anchors through the communication module, calculate a position of the terminal based on the signal transmitted from the terminal, determine whether to unlock the door in response to the position of the terminal and the detection signal, and control an engine to start. The processor controls the anchors to enter a sleep mode in response to waiting times of the anchors and resets the anchors to release the sleep mode and controls the anchors to enter a waiting mode in response to the number of anchors transmitting the signal from the terminal.
PROTECTION DEVICE FOR BEING PROVIDED INSIDE A KEY FOB AND CORRESPONDING KEY CONTROL SYSTEM
It is provided a protection device for being provided inside a key fob to selectively inactivate the key fob. The protection device comprises: a first conductive layer; a second conductive layer; an insulator layer between the first conductive layer and the second conductive layer, the insulator layer preventing conductive contact between the first conductive layer and the second conductive layer; and a switch conductively coupled between the first conductive layer and the second conductive layer, the switch being wirelessly controllable to be in a conductive state or a blocking state.
Secure wireless lock-actuation exchange
System and techniques for a secure wireless lock-actuation exchange are described herein. After receiving a request to actuate a lock from a device, a controller can calculate a challenge counter and then perform verification iterations until an end condition is met—which is a failure of a verification iterations or the number of iterations reaches the challenge count. If the verification iterations reach the challenge count (e.g., there are no failed iterations), then the controller actuates the lock. Each iteration includes an exchange between the device and the controller that the device validates by signing a message with a private key shared by the device and the controller. The exchange also includes a freshness value integrated into the device validation to prevent replay attacks.
Passive digital key systems
Techniques are provided for validating a mobile device in a passive digital key system. An example method of validating a mobile device includes determining a positioning measurement for the mobile device relative to a reference point, obtaining a measured distance with at least a first transceiver, obtaining a calibration distance based at least in part on the positioning measurement for the mobile device, computing a validation distance based at least in part on a difference between the measured distance and the calibration distance, and validating the mobile device based at least in part on a comparison of the validation distance and a threshold value.
Relay attack prevention
Passive entry systems, such as passive entry-passive start vehicle systems, using short-range wireless communication signals to determine a distance between nomadic devices and unlockable devices based on a round trip time of flight (TOF) measurement.
Method and System for Relay Attack Prevention Using Subzones
A method of detecting if a relay is present in a PEPS system for a vehicle is provided. The PEPS system includes a plurality of predefined subzones within one or more vehicle inclusion zones and the method includes the steps of: (a) transmitting a challenge signal including an LF telegram and CW signals from one or more antennas associated with the vehicle to a key fob, the CW signals being measured by the key fob; and (b) determining if CW signals measured by the key fob meet predetermined magnetic field strength values associated with one or more subzones from a plurality of predefined subzones, the predefined subzones being derived to accept the magnetic field distributions at localised positions within a valid inclusion zone and reject magnetic field distributions generated by a relay at a relay transmitter.