Patent classifications
G07C2009/005
WIRELESS COMMUNICATION SYSTEM
A wireless communication system includes: an in-vehicle unit mounted on a vehicle and capable of wirelessly transmitting an access signal when an operation unit is operated; a portable device capable of wirelessly transmitting a vehicle-specific authentication code on a condition that the access signal is received; and a determination unit capable of determining whether or not the authentication code is a regular authentication code on a condition that the authentication code is received. Start of a driving source of the vehicle is permitted or running of the vehicle is enabled when the determination unit determines that the authentication code is the regular authentication code, and a security mode in which a function of transmitting the access signal by the in-vehicle unit or a function of transmitting the authentication code by the portable device is stopped can be set by a predetermined setting operation.
Apparatus and method for registration and authentication of user equipment for controlling vehicle
A device for registering and authenticating a user device for vehicle control includes: a communication unit connected to the user device to receive an authentication request from the user device; an interface configured to communicatively connect with at least one antenna included in the vehicle and communicating with a FOB of the vehicle; and a processor configured to detect whether the user device is registered based on at least one of user information and device information included in the received authentication request, to detect whether a user of the user device has the FOB by using the at least one antenna, and to control a registration process of the user device which is set differently depending on whether the user has the FOB when the user device is not registered.
AUTO SECURITY AND AUTO SAFETY SYSTEM
A method for implementing security on a vehicle, comprising integrating an auto device on the vehicle; receiving, at the auto device, input from a remote device to authenticate the remote device to the auto device; verifying, at the auto device, that the remote device is a first authenticated remote device or one of a sequence of at least one subsequently authenticated remote devices; and enabling a security related function of the vehicle upon receiving, at the auto device, instruction from the remote device if the remote device is a first authenticated remote device.
ELECTRONIC KEY SYSTEM, ON-BOARD DEVICE, AND ELECTRONIC KEY
An electronic key system includes an on-board device and an electronic key for wireless communication. The on-board device includes: a pattern determining unit sequentially changes and determines a variation pattern of the electromagnetic wave intensity of a measurement signal; a request signal generating unit generating a request signal to which the measurement signal is added; and an LF transmitter sequentially transmitting the request signal so that the variation pattern of the electromagnetic wave intensity of the measurement signal in the request signal is changed by the pattern determining unit. The electronic key includes: an LF receiver receiving the request signal; a measurement unit sequentially measuring the variation pattern; and a key transmitter transmitting a response signal to the on-board device. The on-board device further includes: an on-board device receiver receiving the response signal; and a verifying section establishing verification of the electronic key.
METHOD AND SYSTEM FOR AUTHENTICATING AND SECURING VEHICULAR SERVICES
A method of authenticating and securing a vehicular service includes receiving, by a controller of a vehicle, an activation signal. The activation signal is indicative that the vehicular service has been requested by a vehicle user. The method further includes determining whether a registered vehicle operator of the vehicle is the vehicle user that requested the vehicular service in response to receiving the activation signal. Moreover, the method includes sending a notification to the registered vehicle operator of the vehicle that an unauthorized entry of the vehicle has occurred in response to determining that the registered vehicle operator of the vehicle is not the vehicle user that requested the vehicular service. The method may also include the delegation of authorization to other people, contacting emergency services upon hostage situation, family-friends pre-authentication, etc.
Method and system for authenticating and securing vehicular services
A method of authenticating and securing a vehicular service includes receiving, by a controller of a vehicle, an activation signal. The activation signal is indicative that the vehicular service has been requested by a vehicle user. The method further includes determining whether a registered vehicle operator of the vehicle is the vehicle user that requested the vehicular service in response to receiving the activation signal. Moreover, the method includes sending a notification to the registered vehicle operator of the vehicle that an unauthorized entry of the vehicle has occurred in response to determining that the registered vehicle operator of the vehicle is not the vehicle user that requested the vehicular service. The method may also include the delegation of authorization to other people, contacting emergency services upon hostage situation, family-friends pre-authentication, etc.
AUTHENTICATION WITH AUTHORIZATION CREDENTIAL EXCHANGE
Systems and methods may be used for authenticating and validating a credential for performing an action. A method may include using an access control device to exchange public keys with a user device. The method may include sending, to the user device, a first authentication cryptogram including a first signature, a public key certificate, and a Credential Trust Information (CTI), and receiving, from the user device, a second authentication cryptogram including a second signature, a public key of the user device, and a credential. The access control device may authenticate the user device based on the credential and the second signature The access control device may determine whether the credential received in the second authentication cryptogram is signed by a trusted credential issuer to validate the user device. The method may include causing the action to be performed.