Patent classifications
G07C2009/00476
VEHICLE DEAUTHORIZATION OF USER DEVICE
Authorization of a user device is suspended based on determining, for a first predetermined time, a distance between the user device and a vehicle is greater than a threshold distance. Then a user input specifying a vehicle parameter is requested. Upon receiving the user input, the user input is validated based on the user input matching a stored vehicle parameter. The user device is deauthorized based on a) failing to receive a valid user input within a second predetermined time, or b) receiving a number of invalid user inputs equal to a threshold number.
Method and apparatus for controlling entrance guard
A method for controlling an entrance guard, includes: determining a dynamic password generation algorithm consistent with a smart door lock; starting running the dynamic password generation algorithm, and triggering the smart door lock to run the dynamic password generation algorithm; and after receiving password generation request information, determining a current dynamic password.
Upgrade kit for an ignition key and methods
One variation of an upgrade kitfor an ignition key corresponding to a vehicle and including an immobilizer transponder and a keyless entry transmitterincludes: a wireless jammer configured to interfere with wireless transmission from the immobilizer transponder; a wireless receiver configured to receive an unlock request from an external device; a relay configured to actuate the keyless entry transmitter to unlock a door of the vehicle in response to the unlock request; and an enclosure configured to contain the wireless receiver and a portion of the ignition key.
METHOD AND APPARATUS FOR CONTROLLING ENTRANCE GUARD
A method for controlling an entrance guard, includes: determining a dynamic password generation algorithm consistent with a smart door lock; starting running the dynamic password generation algorithm, and triggering the smart door lock to run the dynamic password generation algorithm; and after receiving password generation request information, determining a current dynamic password.
Method and apparatus to facilitate message transmission and reception using different transmission characteristics
Upon providing (101) message content (such as a remote control instruction) to be transmitted, and in conjunction with provision (102) of a plurality of different transmission characteristics (as correspond, for example, to different types of transmission) and a corresponding plurality of correlated recovery identifiers (103), a particular transmission characteristic is selected (104) and used to transmit (105) a joint message. In particular, in a preferred approach, the selected transmission characteristic (106) is used when transmitting at least a portion of the message content portion of the joint message while another part of the joint message carries the recovery identifier to thereby facilitate selection of an appropriate reception technique by a receiver when receiving the joint message.
Electronic key management system assisting device, electronic key management system, method, and storage medium
An electronic key management system assisting device including: a connector (31) that is mounted in a vehicle and is used for a connection with an in-vehicle authentication device communicating with a management server using an in-vehicle communication device; and a requester (35B) that requests the management server to transmit an execution key for obtaining a permission for a transition to a registration mode in which an electronic key of the vehicle is registered in the in-vehicle registration device or an invalidation mode in which the electronic key registered in the in-vehicle registration device is invalidated using a communication device other than the in-vehicle communication device in a case which the in-vehicle authentication device connected through the connector is not able to communicate with the management server using the in-vehicle communication device.
On-vehicle authentication apparatus, authentication method and storage medium
A vehicle authentication apparatus including an acquisition unit (65D) configured to acquire information indicating a content of a manipulation on a vehicle from a detection unit mounted on the vehicle; a manipulation determination unit (65E) configured to determine whether a predetermined collaborative manipulation executable by two or more manipulators is performed on the basis of information acquired by the acquisition unit; and an execution unit (65F, 65H) configured to execute a registration process of registering an electronic key of the vehicle in the on-vehicle authentication apparatus or an invalidation process of invalidating the electronic key registered in the on-vehicle authentication apparatus, in a case that it is determined by the manipulation determination unit that the collaborative manipulation is performed.
Enhanced access control based on key proximity
Embodiments relate to enhanced access control features based on proximity between a portable electronic key and an electronic locking device. The portable electronic key receives first authentication information from an access administration device. Based on the portable electronic key being located within a threshold distance to the electronic locking device, the portable electronic key receives second authentication information from the access administration device. In some aspects, determining whether the key is located within the threshold distance to the electronic locking device comprises detecting a communication between the locking device and the portable electronic key. The portable electronic key may initiate an unlocking event at the electronic locking device based on the first authentication information and the second authentication information. Initiating the unlocking event comprises transmission of an access credential that causes the electronic locking device to permit access to an entry point.
Electronic key device utilizing user input to facilitate access by authorized persons
Embodiments relate to the processing of information associated with a user of a portable electronic key to limit use of the key by unauthorized persons. The portable electronic key includes an input device configured to receive user input information from a holder of the key. A user verification procedure is performed based on the user input information. The user input information can include biometric information associated with the holder of the key. The user verification procedure includes a determination that the user input information corresponds to authorized user information stored in a memory of the key. Based in part on execution of the user verification procedure, the portable electronic key can be configured to initiate an unlocking event at an entry point.
Challenge-response badge
Techniques described and suggested in the present document include access-card systems and methods that are resistant to attack. In certain implementations, a card reader transmits a challenge message to an access card. When the access card receives the challenge message, the access card validates the challenge message, and then generates a response message based at least in part on the information contained in the challenge message. A security server validates the response message, and when the security server determines that the response is secure, valid, and from an authorized access card, the security server grants access to a physical space. In some implementations, the challenge and response messages are digitally signed using a cryptographic key. Additional implementations include various tests that, when performed on the challenge and/or response messages detect and defeat many attempts to compromise the access-card system.