B60R25/2072

Automatic access and starting system for motor vehicle and method for managing access to a vehicle

The invention concerns an automatic access and starting system for a motor vehicle, comprising an on-board access management system and at least one identifier (3) such as an electronic key, the access management system being configured to detect and authenticate the identifier (3) when it is close to the vehicle (1), the identifier (3) being configured to emit an authentication signal in response to an interrogation signal emitted by the management and access system, the identifier (3) comprising a memory for storing an instruction relative to a command issued by the carrier of the identifier (3) if this command is issued during the phase of detection and authentication by the on-board system, the instruction being stored temporarily in order for the identifier to be able to emit a signal related to the command when the detection and authentication phase is complete.

Authentication device, vehicle, authentication method, and storage medium storing an authentication program

An authentication device including: a processor; a first communication section installed at a vehicle and configured to perform first wireless communication with a terminal; and a plurality of second communication sections installed at the vehicle and configured to perform second wireless communication with the terminal, the processor being configured to: compute a distance and an angle of a position of the terminal with respect to the first communication section based on the first wireless communication of the first communication section with the terminal; cause a second communication section that, out of the plurality of second communication sections, corresponds to the computed angle, to execute the second wireless communication with the terminal; and determine, based on the executed second wireless communication and the computed distance, whether or not the terminal is present in an area corresponding to the second communication section executing the second wireless communication.

Passive entry/passive start access systems including round trip time sniffing

A system for includes master and sniffer devices. The master device includes: first antennas with different polarized axes; a transmitter transmitting a challenge signal via the first antennas from the vehicle to a slave device, where the slave device is a portable access device; and a receiver receiving a response signal in response to the challenge signal from the slave device. The sniffer device includes: second antennas with different polarized axes; and a receiver receiving, via the second antennas, the challenge signal from the transmitter and the response signal from the slave device. The sniffer device measures when the challenge signal and the response signal arrive at the sniffer device to provide arrival times. The master or sniffer device estimates at least one of a distance from the vehicle to the slave device or a location of the slave device relative to the vehicle based on the arrival times.

DIGITAL KEY RELAY ATTACK PREVENTION SYSTEMS AND METHODS

Systems and methods for preventing digital key relay attacks are provided. A method includes determining a threshold response time for a wireless communications device to process a challenge. Determining the threshold response time may include determining a benchmark response time for the wireless communications device to respond to the challenge based on one or more conditions of the wireless communications device, and setting the threshold response time to the benchmark response time. The method further includes sending the challenge to the wireless communications device. The method further includes receiving a response to the challenge from the wireless communications device within a response time. The method further includes authenticating the wireless communications device based on the response time being less than the threshold response time. Associated systems are also provided.

Information processing apparatus, system and method

According to one embodiment, an information processing apparatus is applied to an embedded system in an electric device and includes a first circuit. The first circuit is configured to request a server different from the information processing apparatus to determine whether a debug or software change is possible in response to external access.

AUTHENTICATION DEVICE, VEHICLE, AUTHENTICATION METHOD, AND STORAGE MEDIUM STORING AN AUTHENTICATION PROGRAM

An authentication device including:a processor; a first communication section installed at a vehicle and configured to perform first wireless communication with a terminal; and a plurality of second communication sections installed at the vehicle and configured to perform second wireless communication with the terminal, the processor being configured to: compute a distance and an angle of a position of the terminal with respect to the first communication section based on the first wireless communication of the first communication section with the terminal; cause a second communication section that, out of the plurality of second communication sections, corresponds to the computed angle, to execute the second wireless communication with the terminal; and determine, based on the executed second wireless communication and the computed distance, whether or not the terminal is present in an area corresponding to the second communication section executing the second wireless communication.

Vehicle control system
11285917 · 2022-03-29 ·

The present disclosure provides an apparatus, method and system for use with a vehicle having passive keyless entry and start (PKES) system including a vehicle unit and a key fob storage unit. The vehicle united is to be installed with the vehicle having a first transceiver, a first relay transceiver an authentication unit, a first controller for controlling said first relay transceiver allowing said transmission if said user is authenticated. The key fob storage unit comprises at least one housing for securely holding at least one key fob associated with said PKES systems of said vehicles, a second, said second wireless relay w wherein said first relay transceiver and said second relay transceiver allows said PKES system and said key fob to communicate from a distance larger than a range of said PKES system signals.

DIGITAL KEYS AND SYSTEMS FOR PREVENTING RELAY ATTACKS
20220089121 · 2022-03-24 ·

Computer systems for training a machine learning model for preventing relay attacks. Including portable electronic devices capable of controlling the opening or closing, contactlessly, of an access to a road vehicle on the basis of a pretrained machine learning model. The general principle is based on the use of smartphones as a digital key for accessing a road vehicle. Machine learning is used to train a learning model capable of predicting the movement of a smartphone of this type as it approaches or moves away from the road vehicle. Subsequently, access to the road vehicle is authorized only when same receives the information on the movement of the smartphone.

KEY FOB COMMUNICATION CONTROL
20220063561 · 2022-03-03 ·

Communication with a key fob of a vehicle can be controlled based on a key fob jamming condition. One or more sensors can be configured to detect the key fob jamming condition. In response to the key fob jamming condition being detected, a jamming device can be activated to cause one or more jamming signals to be emitted. The one or more jamming signals can prevent the key fob from receiving and responding to other signals.

Secure wireless lock-actuation exchange

System and techniques for a secure wireless lock-actuation exchange are described herein. After receiving a request to actuate a lock from a device, a controller can calculate a challenge counter and then perform verification iterations until an end condition is met—which is a failure of a verification iterations or the number of iterations reaches the challenge count. If the verification iterations reach the challenge count (e.g., there are no failed iterations), then the controller actuates the lock. Each iteration includes an exchange between the device and the controller that the device validates by signing a message with a private key shared by the device and the controller. The exchange also includes a freshness value integrated into the device validation to prevent replay attacks.