Patent classifications
G07C2009/00984
VEHICLE MONITORING AND THEFT DETECTION USING LOCATION
A vehicle theft-prevention system can include a mobile application that can determine a location of the mobile device. One or more computing devices can be in communication with the mobile application via a network. The mobile application and the at least one computing device configured to determine that the location of the mobile device has moved outside of a geofence associated with a vehicle theft-prevention apparatus. The mobile application and the at least one computing device can cause the vehicle theft-prevention apparatus to change from an unarmed mode to an armed mode.
Secure wireless key system and method with dynamically adjustable modulation
A system and method are described for securing a vehicle. For example, one embodiment of a method comprises: generating a secret related to a radio frequency (RF) signal characteristic to be transmitted by a key fob; securely sharing the secret between a vehicle and a wireless key fob; periodically transmitting a ping signal from the vehicle in a locked or inactive state; receiving a response ping signal to the ping signal, the response ping signal transmitted by the key fob; identifying at least a first RF signal characteristic associated with the response ping signal; determining whether the first RF signal characteristic is valid based on the secret; unlocking and/or activating the vehicle upon determining that the first RF signal characteristic is valid; and maintaining the locked or inactive state and/or requiring additional authentication if the first RF signal characteristic is invalid.
SECURE ELECTRONIC LOCK SYSTEMS AND METHODS OF USING THE SAME
Present disclosure relates a secure electronic lock system. Secure electronic lock system includes many secure electronic locks connected through a communication network to a secure electronic lock system server. Each secure electronic lock includes a passive electronic lock, an active electronic key and a passive electronic key. Active electronic key includes electrical power source providing electrical power supply to active electronic key, passive electronic lock and passive electronic key. When both active and passive electronic keys are inserted into respective electronic keyholes of passive electronic lock, both active and passive digital keys are transmitted to passive electronic lock, passive electronic lock can be locked and unlocked only when both active and passive digital keys received match prestored active and passive digital keys respectively. Active and passive digital keys are updated and an access event is transmitted to secure electronic lock system server every time each secure electronic lock is accessed.
Secure electronic lock systems and methods of using the same
Present disclosure relates a secure electronic lock system. Secure electronic lock system includes many secure electronic locks connected through a communication network to a secure electronic lock system server. Each secure electronic lock includes a passive electronic lock, an active electronic key and a passive electronic key. Active electronic key includes electrical power source providing electrical power supply to active electronic key, passive electronic lock and passive electronic key. When both active and passive electronic keys are inserted into respective electronic keyholes of passive electronic lock, both active and passive digital keys are transmitted to passive electronic lock, passive electronic lock can be locked and unlocked only when both active and passive digital keys received match prestored active and passive digital keys respectively. Active and passive digital keys are updated and an access event is transmitted to secure electronic lock system server every time each secure electronic lock is accessed.
SYSTEM, LOCK DEVICE AND KEY DEVICE BASED ON MAGNET AND MAGNETICALLY CONTROLLABLE SWITCH
It is provided a system comprising a lock device and a key device for use in access control to a physical space. The key device comprises: an electronic key module configured to communicate with an electronic lock module of the lock device for access control; and a permanent magnet configured to close a magnetically controllable switch of the lock device to thereby power an electronic lock module of the lock device. The lock device comprises: the electronic lock module configured to communicate with the electronic key module to evaluate whether to grant access; a power source; and the magnetically controllable switch provided between the power source and the electronic lock module such that the magnetically controllable switch is closable by the permanent magnet of the key device to power the electronic lock module.
SYSTEM AND METHOD FOR DETECTION AND PREVENTION OF RELAY ATTACK ON VEHICLES KEYLESS SYSTEM
An access system for a vehicle may include at least one antenna configured to receive access signals for authorization to gain access to the vehicle, and a controller configured to receive motion data from a key fob associated with the vehicle, the motion data indicative of a route of a user associated with the key fob, classify the motion data as one of an open route and a closed route, and restrict access to the vehicle in response to the motion data being classified as an open route.
Protection device for being provided inside a key fob and corresponding key control system
It is provided a protection device for being provided inside a key fob to selectively inactivate the key fob. The protection device comprises: a first conductive layer; a second conductive layer; an insulator layer between the first conductive layer and the second conductive layer, the insulator layer preventing conductive contact between the first conductive layer and the second conductive layer; and a switch conductively coupled between the first conductive layer and the second conductive layer, the switch being wirelessly controllable to be in a conductive state or a blocking state.
CLOUD-BASED KEYLESS ENTRY SYSTEM
Systems and methods for cloud-based keyless entry are generally described. In some examples, a first number is received from a vehicle. A first computing device of the vehicle may be configured to control an electronic door lock. A first unlock code may be generated using the first number. In some examples, a notification is sent to a remote entry device associated with the vehicle. A response to the notification may be received from the remote entry device. In some examples, the first number may be retrieved from a messaging service based at least in part on the receiving the response to the notification. A second unlock code may be generated using the first number. A determination may be made that the first unlock code matches the second unlock code. An instruction may be sent to the first computing device, the instruction effective to cause unlock of the electronic door lock.
ELECTRONIC KEY SYSTEM
An electronic key system installed in a vehicle includes: a first wireless communication controller performing transmission of a predetermined radio signal, as a verification signal, via a first wireless communication to confirm presence or absence of each of a first portable device and a second portable device each of which is usable as an electronic key of the vehicle; a second wireless communication controller periodically performing transmission/reception of the radio signal via second wireless communication to and from each of the first portable device and the second portable device upon transmitting/receiving the verification signal; and an integrity controller integrally controlling an operation of each of the first wireless communication controller and the second wireless communication controller.
MODULE FOR WIRELESS AUTHENTICATION OF A USER FOR A KEYLESS ENTRY SYSTEM IN A TRANSPORTATION VEHICLE
A wireless interface for detecting an authorized access of a user to a keyless access system of a transportation vehicle. The part of the wireless interface provided for the wireless communication is detachably connected to the part of the wireless interface containing the electronics to improve the diversity of installation and mounting of the wireless interface.